WorldWideScience

Sample records for security defense-in-depth strategies

  1. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  2. 76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-01-12

    ... day-long workshop on the pros and cons of the defense-in-depth strategy for cyber security. The... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... Information Technology Research and Development (NITRD) Program on behalf of the SCORE Committee. Background...

  3. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-02-07

    ... the pros and cons of the Defense-in-Depth strategy for cyber security. The workshop will be held March... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... notice is issued by the National Coordination Office for the Networking and Information Technology...

  4. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  5. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong; Kim, Young Ki; Park, Jaek Wan

    2012-01-01

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security

  6. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Seoul (Korea, Republic of); Son, Han Seong [Joongbu Univ., Chungnam (Korea, Republic of); Kim, Young Ki; Park, Jaek Wan [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security.

  7. Observability-in-depth: An essential complement to the defense-in-depth safety strategy in the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Favaro, Francesca M.; Saleh, Joseph H. [Georgia Institute of Technology, Atlanta (United States)

    2014-12-15

    Defense-in-depth is a fundamental safety principle for the design and operation of nuclear power plants. Despite its general appeal, defense-in-depth is not without its drawbacks, which include its potential for concealing the occurrence of hazardous states in a system, and more generally rendering the latter more opaque for its operators and managers, thus resulting in safety blind spots. This in turn translates into a shrinking of the time window available for operators to identify an unfolding hazardous condition or situation and intervene to abate it. To prevent this drawback from materializing, we propose propose in this work a novel safety principle termed 'observability-in-depth'. We characterize it as the set of provisions technical, operational, and organizational designed to enable the monitoring and identification of emerging hazardous conditions and accident pathogens in real-time and over different time-scales. Observability-in-depth also requires the monitoring of conditions of all safety barriers that implement defense-in-depth; and in so doing it supports sense making of identified hazardous conditions, and the understanding of potential accident sequences that might follow (how they can propagate). Observability-in-depth is thus an information-centric principle, and its importance in accident prevention is in the value of the information it provides and actions or safety interventions it spurs. We examine several 'event reports' from the U.S. Nuclear Regulatory Commission database, which illustrate specific instances of violation of the observability-in-depth safety principle and the consequences that followed (e.g., unmonitored releases and loss of containments). We also revisit the Three Mile Island accident in light of the proposed principle, and identify causes and consequences of the lack of observability-in-depth related to this accident sequence. We illustrate both the benefits of adopting the observability

  8. GNF Defense in Depth Update

    Energy Technology Data Exchange (ETDEWEB)

    Lingenfelter, Andrew A.; Schneider, Robert J.; Cantonwine, Paul E.; Moore, Brian; Rea, John; Crawford, Douglas C. [Global Nuclear Fuel, P.O. Box 780 M/C H25, Wilmington, NC 28402 (United States)

    2009-06-15

    Global Nuclear Fuel (GNF) has designed, fabricated, and placed into operation more than 9 million fuel rods in approximately 135 thousand assemblies. Customer satisfaction has always compelled GNF to reduce fuel rod failures (defined here as fuel rods that breach or leak in service), However, increasing success with and subsequent expectations for economic performance of nuclear reactor plants have raised broader Industry emphasis on fuel reliability. In 2005, GNF established its Defense-in-Depth (DID) Program for the purpose of focusing attention on the many aspects of fuel design, fabrication, performance, and utilization that affect fuel reliability as well as on the key methods that govern the utilization of GNF fuel. The Program is structured to address each of the identified in-service, fuel failure mechanisms. This paper provides a summary of GNF fuel performance, following previous updates. This paper will discuss recent GNF fuel reliability and channel performance, GNF2 introduction status, and methods. GNF's more recent fuel experience includes approximately 3.8 million GE11/13 (9x9) and GE12/14 (10x10) fuel rods, well over half of which are the GE12/14 design. (Those figures also include roughly 25,000 recently-introduced GNF2 fuel rods.) Reliability, expressed as annual, observed fuel failure rates (i.e., number of rods failed each year divided by the number of opportunities, or fuel rods in service), has improved for each year since 2005. The GNF fuel failure rate for years leading up to 2007 and 2008 has been on the order of 5 to 7 ppm (excluding the corrosion events of 2001-2003), and as of this writing (January 2009) the current in-service failure has decreased to around 1.5 ppm. Failures in GE14 fuel rod failures have been primarily due to debris-fretting (> 60%), with other failures being duty-related or yet undetermined. The only failure observed in GNF2 to date was a single, early-life debris failure in a bundle not equipped with GNF

  9. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  10. Revisiting the Concept and Implementation of Defense-in-Depth

    International Nuclear Information System (INIS)

    Choi, Youngsung

    2013-01-01

    The subsequent tsunami, with its maximum wave height greater than the design basis, invalidated all layers of the Fukushima NPP. This raises the question on which of the philosophy or the implementation of DID fell short at Fukushima. This paper suggests several complements necessary to the concept of DID and new application practice in a wide variety of safety related objectives/areas/events. Since its conception, DID appears to have been successfully applied to the design and operation but less to the site, external events, resource requirements, the unexpected impacts of organization, etc. Thus, the horizontal as well as vertical application of DID is suggested. Here, the latter application means repeated questions of 'What if this fails?' and the former one means the application of DID to all the applicable objectives, which can be a real defense-in-width. It is widely accepted that defense-in-depth (DID) has been the core of safety philosophy in nuclear safety regulation. Its concept has been developed and refined over many years to go beyond physical barriers and design practices. The historical development of the concept led to a general structure of four physical barriers and five successive levels of defense. The accident at the Fukushima nuclear power plant (NPP) showed that multiple levels of defense could fail at the same time, demonstrated how these could work and how some were challenged, and gave the chance of the concept and implementation being improved. This paper examines the traditional concept and implementation strategies of DID, identifies some weaknesses in that, and suggest some complements and new approach to improving the application of DID

  11. Defense in Depth: Foundation for Secure and Resilient IT Enterprises

    National Research Council Canada - National Science Library

    May, Christopher J; Hammerstein, Josh; Mattson, Jeff; Rush, Kristopher

    2006-01-01

    ... into how technical assurance issues affect their entire organizations. The course material takes a big-picture view while also reinforcing concepts presented with some details about implementation...

  12. Defense in Depth: Foundation for Secure and Resilient IT Enterprises

    Science.gov (United States)

    2006-09-01

    reclassified as part of a broader standard called ISO 27001 . BS7799 Part II is the assessment standard for ISO 17799 compliance. 62 CMU/SEI-2006-HB-003...the International Standards Organization ( ISO ) to ensure global interoperability. Government standards from the National Institute of Standards and...cooperation with the larger group. Two examples of standard-setting entities are the International Standards Organization ( ISO ) and the National

  13. Evolution of System Safety at NASA as Related to Defense-in-Depth

    Science.gov (United States)

    Dezfuli, Homayoon

    2015-01-01

    Presentation given at the Defense-in-Depth Inter-Agency Workshop on August 26, 2015 in Rockville, MD by Homayoon Dezfuli. The presentation addresses the evolution of system safety at NASA as related to Defense-in-Depth.

  14. Defense-in-depth approach against a beyond design basis event

    Energy Technology Data Exchange (ETDEWEB)

    Hoang, H., E-mail: Hoa.hoang@ge.com [GE Hitachi Nuclear Energy, 1989 Little Orchard St., 95125 San Jose, California (United States)

    2013-10-15

    The US industry, with the approval of the Nuclear Regulatory Commission, is promoting an approach to add diverse and flexible mitigation strategies, or Flex, that will increase the defense-in-depth capability for the nuclear power plants in the event of beyond design basis event, such as at the Fukushima Dai-ichi station. The objective of Flex is to establish and indefinite coping capability to prevent damage to the fuel in the core and spent fuel pool, and to maintain the containment function by utilizing installed equipment, on-site portable equipment and pre-staged off-site resources. This capability will address both an extended loss of all Ac power and a loss of ultimate heat sink which could arise following a design basis event with additional failures, and conditions from a beyond design basis event. (author)

  15. Defense-in-depth approach against a beyond design basis event

    International Nuclear Information System (INIS)

    Hoang, H.

    2013-10-01

    The US industry, with the approval of the Nuclear Regulatory Commission, is promoting an approach to add diverse and flexible mitigation strategies, or Flex, that will increase the defense-in-depth capability for the nuclear power plants in the event of beyond design basis event, such as at the Fukushima Dai-ichi station. The objective of Flex is to establish and indefinite coping capability to prevent damage to the fuel in the core and spent fuel pool, and to maintain the containment function by utilizing installed equipment, on-site portable equipment and pre-staged off-site resources. This capability will address both an extended loss of all Ac power and a loss of ultimate heat sink which could arise following a design basis event with additional failures, and conditions from a beyond design basis event. (author)

  16. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    Science.gov (United States)

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  17. Modeling and Analyzing Intrusion Attempts to a Computer Network Operating in a Defense in Depth Posture

    National Research Council Canada - National Science Library

    Givens, Mark

    2004-01-01

    In order to ensure the confidentially, integrity, and availability of networked resources operating on the Global Information Grid, the Department of Defense has incorporated a "Defense-in-Depth" posture...

  18. Principles of Defense-in-depth philosophy applied in NPP engineering management

    International Nuclear Information System (INIS)

    Wu Guangwei

    2011-01-01

    Based on the Defense-in-depth Concept in nuclear and radiation safety, Defense-in-depth Concept for design management of Nuclear Power Plant (NPP) is developed in this paper to analyze the feasibility and importance of the application of the basic principle: Defense-in-depth concept in NPP systems performed during the design control of NPP. This paper focuses on the NPP engineering management process, and according to the analysis of such process, 5 principles of Defense-in-depth Concept applied in NPP design management are raised: (1) preventing the non-conformities of design via effective design quality management system; (2) discovering and correcting non-conformities of design quality in time via design checkup and design review meeting; (3) carrying out timely analysis and treatment against design non-conformities which have been transferred to construction phase; (4) Assessing and judging the severe non-conformities in construction phase, putting forward treatment opinions and remedies accordingly so as to avoid the existence of such non-conformities in physical construction of NPP; (5) Paying 'return-visit' and performing 'post-assessment' for NPP design to assess the designed functions and safety of NPP comprehensively. (author)

  19. A defense in depth approach for nuclear power plant accident management

    Energy Technology Data Exchange (ETDEWEB)

    Chih-Yao Hsieh; Hwai-Pwu Chou [Institute of Nuclear Engineering and Science, National Tsing Hua University, Hsinchu, TW (China)

    2015-07-01

    An initiating event may lead to a severe accident if the plant safety functions have been challenged or operators do not follow the appropriate accident management procedures. Beyond design basis accidents are those corresponding to events of very low occurrence probability but such an accident may lead to significant consequences. The defense in depth approach is important to assure nuclear safety even in a severe accident. Plant Damage States (PDS) can be defined by the combination of the possible values for each of the PDS parameters which are showed on the nuclear power plant simulator. PDS is used to identify what the initiating event is, and can also give the information of safety system's status whether they are bypassed, inoperable or not. Initiating event and safety system's status are used in the construction of Containment Event Tree (CET) to determine containment failure modes by using probabilistic risk assessment (PRA) technique. Different initiating events will correspond to different CETs. With these CETs, the core melt frequency of an initiating event can be found. The use of Plant Damage States (PDS) is a symptom-oriented approach. On the other hand, the use of Containment Event Tree (CET) is an event-oriented approach. In this study, the Taiwan's fourth nuclear power plants, the Lungmen nuclear power station (LNPS), which is an advanced boiling water reactor (ABWR) with fully digitized instrumentation and control (I and C) system is chosen as the target plant. The LNPS full scope engineering simulator is used to generate the testing data for method development. The following common initiating events are considered in this study: loss of coolant accidents (LOCA), total loss of feedwater (TLOFW), loss of offsite power (LOOP), station blackout (SBO). Studies have indicated that the combination of the symptom-oriented approach and the event-oriented approach can be helpful to find mitigation strategies and is useful for the accident

  20. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    International Nuclear Information System (INIS)

    Seidel, F.

    1998-01-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper's intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  1. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, F [Federal Office for Radiation Protection, Salzgitter (Germany)

    1998-10-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper`s intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  2. Survey of the Diversity and Defense-in-Depth Technologies for Application to NPP Digital I and C Systems

    International Nuclear Information System (INIS)

    Cheon, S. W.; Kim, J. Y.; Choi, J. G.

    2011-09-01

    This report reviews the nature of common-cause failures (CCFs) of the digital I and C (instrumentation and control) systems, diversity and defense-in-depth (D3) technologies and those practices in nuclear power plants. The report presents the diversity strategies, which consist of combinations of diversity attributes and their associated criteria. The report also presents assessment of the nature of CCFs and compensating diversity attributes. The diversity usage classification scheme involves three families of strategies: (1) different technologies (Strategies A), (2) different approaches within the same technology (Strategies B), and (3) different architectures within the same technology (Strategies C). The grouping of diversity criteria combinations establishes baseline diversity usage and facilitates a systematic organization of strategic approaches for coping with CCF vulnerabilities. Effectively, these baseline sets of diversity criteria constitute appropriate CCF mitigating strategies for digital safety systems. The strategies represent guidance on acceptable diversity usage and can be applied directly to ensure that CCF vulnerabilities identified through a D3 assessment have been adequately resolved. Additionally, the report presents the framework of diversity usage tables are presented for capturing practices regarding diversity usage

  3. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  4. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  5. Configuration of Risk Monitor System by PLant Defense-In.Depth Monitor and Relability Monitor

    DEFF Research Database (Denmark)

    Yoshikawa, Hidekazu; Lind, Morten; Yang, Ming

    2012-01-01

    A new method of risk monitor system of a nuclear power plant has been proposed from the aspect by what degree of safety functions incorporated in the plant system is maintained by multiple barriers of defense-in-depth (DiD). Wherein, the central idea is plant DiD risk monitor and reliability...... monitor derived from the four aspects of (i) design principle of nuclear safety to realize DiD concept, (ii) definition of risk and risk to be monitored, (iii) severe accident phenomena as major risk, (iv) scheme of risk ranking, and (v) dynamic risk display. In this paper, the overall frame...... of the proposed frame on risk monitor system is summarized and the detailed discussion is made on the definitions of major terminologies of risk, risk ranking, anatomy of fault occurrence, two-layer configuration of risk monitor, how to configure individual elements of plant DiD risk monitor and its example...

  6. Method for performing diversity and defense-in-depth analyses of reactor protection systems

    International Nuclear Information System (INIS)

    Preckshot, G.G.

    1994-12-01

    The purpose of this NUREG is to describe a method for analyzing computer-based nuclear reactor protection systems that discovers design vulnerabilities to common-mode failure. The potential for common-mode failure has become an important issue as the software content of protection systems has increased. This potential was not present in earlier analog protection systems because it could usually be assumed that common-mode failure, if it did occur, was due to slow processes such as corrosion or premature wear-out. This assumption is no longer true for systems containing software. It is the purpose of the analysis method described here to determine points of a design for which credible common-mode failures are uncompensated either by diversity or defense-in-depth

  7. 'Defense-in-Depth' Laser Safety and the National Ignition Facility

    International Nuclear Information System (INIS)

    King, J.J.

    2010-01-01

    The National Ignition Facility (NIF) is the largest and most energetic laser in the world contained in a complex the size of a football stadium. From the initial laser pulse, provided by telecommunication style infrared nanoJoule pulsed lasers, to the final 192 laser beams (1.8 Mega Joules total energy in the ultraviolet) converging on a target the size of a pencil eraser, laser safety is of paramount concern. In addition to this, there are numerous high-powered (Class 3B and 4) diagnostic lasers in use that can potentially send their laser radiation travelling throughout the facility. With individual beam paths of up to 1500 meters and a workforce of more than one thousand, the potential for exposure is significant. Simple laser safety practices utilized in typical laser labs just don't apply. To mitigate these hazards, NIF incorporates a multi layered approach to laser safety or 'Defense in Depth.' Most typical high-powered laser operations are contained and controlled within a single room using relatively simplistic controls to protect both the worker and the public. Laser workers are trained, use a standard operating procedure, and are required to wear Personal Protective Equipment (PPE) such as Laser Protective Eyewear (LPE) if the system is not fully enclosed. Non-workers are protected by means of posting the room with a warning sign and a flashing light. In the best of cases, a Safety Interlock System (SIS) will be employed which will 'safe' the laser in the case of unauthorized access. This type of laser operation is relatively easy to employ and manage. As the operation becomes more complex, higher levels of control are required to ensure personnel safety. Examples requiring enhanced controls are outdoor and multi-room laser operations. At the NIF there are 192 beam lines and numerous other Class 4 diagnostic lasers that can potentially deliver their hazardous energy to locations far from the laser source. This presents a serious and complex potential

  8. Configuration of risk monitor system by plant defense-in-depth risk monitor and reliability monitor

    International Nuclear Information System (INIS)

    Yoshikawa, Hidekazu; Lind Morten; Yang Ming; Hashim Muhammad; Zhang Zhijian

    2012-01-01

    A new method of risk monitor system of a nuclear power plant has been proposed from the aspect by what degree of safety functions incorporated in the plant system is maintained by multiple barriers of defense-in-depth (DiD). Wherein, the central idea is plant DiD risk monitor and reliability monitor derived from the five aspects of (1) design principle of nuclear safety based on DiD concept, (2) definition of risk and risk to be monitored, (3) severe accident phenomena as major risk, (4) scheme of risk ranking, and (5) dynamic risk display. In this paper, the overall frame of the proposed risk monitor system is summarized and the detailed discussion is made on major items such as definition of risk and risk ranking, anatomy of fault occurrence, two-layer configuration of risk monitor, how to configure individual elements of plant DiD risk monitor, and lastly how to apply for a PWR safety system. (author)

  9. Defense-in-depth and diversity assessment of the RESAR-414 Integrated Protection System

    International Nuclear Information System (INIS)

    1979-01-01

    This report discusses the defense-in-depth and diversity principles as they apply to safety related instrumentation and presents guidelines which can be used to assess the degree to which the designs of complex, interconnected safety systems conform to these principles. These guidelines are based on the use of the block concept, an approach in which the components and modules of the system are aggregated into a small number of functional units, or blocks, to simplify the analysis. It is believed that the use of the block concept and the guidelines will result in a conservative assessment of the capability of such systems to function when subjected to postulated to common-mode failures. A preliminary assessment of the RESAR-414 Integrated Protection System by means of the guidelines is also presented. The results of this assessment support the conclusion that, for purposes of a preliminary design approval, the RESAR-414 Integrated Protection System is acceptable. However, the assessment, has also resulted in requirements for additional analyses and tests, the results of which must demonstrate conformance to the guidelines prior to the issuance of a Final Design Approval

  10. Defense-in-depth evaluation for the New Waste Transfer Facility

    International Nuclear Information System (INIS)

    Hayes, T.G.; Kelly, J.L.

    1995-01-01

    This report fulfills part of the requirements of References 2 and 3 by documenting a Defense-In-Depth evaluation for the New Waste Transfer Facility (NWTF). This evaluation was performed using methodology similar to that used in an evaluation for the Defense Waste Processing Facility (DWPF). It differs because the DWPF evaluation was based on an existing Process Hazards Analysis (PHA) while NWTF's is based on a Preoperational Process Hazards Review (PHR) (Ref. 1). The accidents in the Process Hazards Review (PHR) were reviewed to determine those that might have significant consequences. Significance was based on the findings of the PHR, The facility design was reviewed to determine the Structures, Systems, and Components (SSCs) and administrative controls available before and after each accident. From this was developed a list of the Lines of Defense (LODs) available to contain the hazard associated with the accident. A summary of these LODs is given in Appendix C. Items are tabulated that are suggested for consideration in the functional classification as worker protection items. The specific criteria used in the evaluation is given in the methodology section of this report. The results are documented in Appendices A, B, C, and D

  11. Strategies for online test security.

    Science.gov (United States)

    Hart, Leigh; Morgan, Lesley

    2009-01-01

    As online courses continue to increase, maintaining academic integrity in student evaluation is a challenge. The authors review several strategies, with varying degrees of cost and technology, to improve test security in the online classroom.

  12. Defense In-Depth Accident Analysis Evaluation of Tritium Facility Bldgs. 232-H, 233-H, and 234-H

    International Nuclear Information System (INIS)

    Blanchard, A.

    1999-01-01

    'The primary purpose of this report is to document a Defense-in-Depth (DID) accident analysis evaluation for Department of Energy (DOE) Savannah River Site (SRS) Tritium Facility Buildings 232-H, 233-H, and 234-H. The purpose of a DID evaluation is to provide a more realistic view of facility radiological risks to the offsite public than the bounding deterministic analysis documented in the Safety Analysis Report, which credits only Safety Class items in the offsite dose evaluation.'

  13. Regulatory point of view on defense in depth approach to fire protection in nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Rinta-Filppula, Samu; Lehto, Matti; Vaelikangas, Pekka [Radiation and Nuclear Safety Authority STUK, Helsinki (Finland)

    2015-12-15

    The defense-in-depth (DiD) principle is a relatively new approach to fire protection design, even though DiD has been used in nuclear power plant (NPP) safety evaluation and design for decades (IAEA 75-INSAG-3, Rev. 1/INSAG-12). It is the main design criterion in fire protection in the latest edition of Finnish Radiation and Nuclear Safety Authority (STUK) issued guide YVL B.8 for the fire protection in nuclear facilities. The DiD approach to fire protection consists of four levels of defense: preventing the ignition of fires, detecting and extinguishing of ignited fires, preventing fire growth and spreading, confining the fire so that safety functions can be performed irrespective of the effects of the fire. The design of fire protection should take all these levels into account so that fire protection is well balanced and not dependent on a single fire protection factor or level of DiD. Despite being central to the design of fire protection, corresponding evaluations of DiD are done according to more or less unambiguous methods. The main goal of this study is to start the development of such, as much as possible, unambiguous systematic and logical method. First issue then is to build a picture of how fire safety features are executed on different levels of DiD and what is the corresponding safety importance to NPP. The Loviisa NPP was studied as an example case due to a long history of fire safety improvements since commissioning in 1977. The improvements are sorted qualitatively by their means of fire safety impact and level of DiD approach to fire protection and general plant DiD. The correspondence between the two DiD principles is an interesting issue which is discussed in this paper. Finally, Fire PRA is used to determine the safety importance of the improvements. The method proposed for the evaluation of DiD approach to fire protection is a combined ignition root cause analysis - event tree of fire scenario - consequential failure modes and effects analysis

  14. Pure National Security Strategy

    Science.gov (United States)

    2011-06-01

    gd1ne997g1lu3p7d&size=largest Berlin, Isaiah . Four Essays on Liberty. New York, NY: Oxford University Press, 1970. Bijker, Wiebe E., Thomas P. Hughes and...of the first scientists to formalize what has long been known to kings and emperors is American economist Thomas C. Schelling. In his influential...Robert Pape simplifies the mechanism where coercion affects 45 Schelling, Thomas C. The Strategy of

  15. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  16. Defense In-Depth Accident Analysis Evaluation of Tritium Facility Bldgs. 232-H, 233-H, and 234-H

    Energy Technology Data Exchange (ETDEWEB)

    Blanchard, A.

    1999-05-10

    'The primary purpose of this report is to document a Defense-in-Depth (DID) accident analysis evaluation for Department of Energy (DOE) Savannah River Site (SRS) Tritium Facility Buildings 232-H, 233-H, and 234-H. The purpose of a DID evaluation is to provide a more realistic view of facility radiological risks to the offsite public than the bounding deterministic analysis documented in the Safety Analysis Report, which credits only Safety Class items in the offsite dose evaluation.'

  17. Development of Core Heat Removal Objective Provision Trees for Sodium-Cooled Fast Reactor Defense-in-Depth Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Huichang; Kang, Bongsuk; Lee, Youngho [TUEV Rheinland Korea Ltd., Seoul (Korea, Republic of); Suh, Namduk [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2013-10-15

    Based on the definition of Defense-in-Depth levels and safety functions for KALIMER sodium-cooled fast reactor, suggested in the reference and, OPTs for level 1, 2, and 3 defense-in-depth and core heat removal safety function, were developed and suggested in this paper. The purpose of this OPT is first to assure the defensein-depth design during the licensing of Sodium-Cooled Fast Reactors (SFR), but it will also contribute in evaluating the completeness of regulatory requirements under development by Korea Institute of Nuclear Safety (KINS). The challenges and mechanisms and provisions were briefly explained in this paper. Comparing the mechanisms and provisions with the requirements will contribute in identifying the missing requirements. Since the design of PGSFR (Prototype Gen-IV SFR) is not mature yet, the OPT is developed for KALIMER design. Developed OPTs in this study can be used for the identification of potential design vulnerabilities. When detailed identification of provisions in terms of design features were achieved through the next step of this study, it can contribute to the establishment of defensein-depth evaluation frame for the regulatory reviews for the licensing process. At this moment, the identified provisions have both aspects as requirements and design features already adopted in KALIMER design. In the next stage of this study, derived provisions to be adopted will be compared with the actual design features and findings can be suggested as recommendations for the safety improvement.

  18. Security solutions: strategy and architecture

    Science.gov (United States)

    Seto, Myron W. L.

    2002-04-01

    Producers of banknotes, other documents of value and brand name goods are being presented constantly with new challenges due to the ever increasing sophistication of easily-accessible desktop publishing and color copying machines, which can be used for counterfeiting. Large crime syndicates have also shown that they have the means and the willingness to invest large sums of money to mimic security features. To ensure sufficient and appropriate protection, a coherent security strategy has to be put into place. The feature has to be appropriately geared to fight against the different types of attacks and attackers, and to have the right degree of sophistication or ease of authentication depending upon by whom or where a check is made. Furthermore, the degree of protection can be considerably increased by taking a multi-layered approach and using an open platform architecture. Features can be stratified to encompass overt, semi-covert, covert and forensic features.

  19. Defense-in-depth for common cause failure of nuclear power plant safety system software

    International Nuclear Information System (INIS)

    Tian Lu

    2012-01-01

    This paper briefly describes the development of digital I and C system in nuclear power plant, and analyses the viewpoints of NRC and other nuclear safety authorities on Software Common Cause Failure (SWCCF). In view of the SWCCF issue introduced by the digitized platform adopted in nuclear power plant safety system, this paper illustrated a diversified defence strategy for computer software and hardware. A diversified defence-in-depth solution is provided for digital safety system of nuclear power plant. Meanwhile, analysis on problems may be faced during application of nuclear safety license are analyzed, and direction of future nuclear safety I and C system development are put forward. (author)

  20. Kanttekeningen bij de Europese cyber security strategie

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Smulders, A.C.M.; Kamphuis, P.

    2013-01-01

    In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.

  1. Food Security Strategies for Vanuatu

    OpenAIRE

    Welegtabit, Shadrack R.

    2001-01-01

    This report describes and analyzes food security conditions and policies in Vanuatu. The national food security systems are dualistic in nature, and the rural and urban food security systems are weakly related. Household food security in rural areas is primarily determined by access to arable land and fishery resources, whereas in urban areas household food security is primarily determined by access to employment. Household food security has been a concern in both rural and urban areas. Both ...

  2. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  3. Knowledge-based software design for Defense-in-Depth risk monitor system and application for AP1000

    International Nuclear Information System (INIS)

    Ma Zhanguo; Yoshikawa, Hidekazu; Yang Ming; Nakagawa, Takashi

    2017-01-01

    As part of the new risk monitor system, the software for the plant Defense-in-Depth (DiD) risk monitor system was designed based on the state-transition and finite-state machine, and then the knowledge-based software was developed by object-oriented method utilizing the Unified Modeling Language (UML). Currently, there are mainly two functions in the developed plant DiD risk monitor software that are knowledge-base editor which is used to model the system in a hierarchical manner and the interaction simulator that simulates the interactions between the different actors in the model. In this paper, a model for playing its behavior is called an Actor which is modeled at the top level. The passive safety AP1000 power plant was studied and the small-break loss-of-coolant accident (SBLOCA) design basis accident transient is modeled using the plant DiD risk monitor software. Furthermore, the simulation result is shown for the interactions between the actors which are defined in the plant DiD risk monitor system as PLANT actor, OPERATOR actor, and SUPERVISOR actor. This paper shows that it is feasible to model the nuclear power plant knowledge base using the software modeling technique. The software can make the large knowledge base for the nuclear power plant with small effort. (author)

  4. Guide to National Security Policy and Strategy

    National Research Council Canada - National Science Library

    Bartholomees, Jr, J. B

    2006-01-01

    ...: Theory of War and Strategy and National Security Policy and Strategy. The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues...

  5. Food Security Strategy Based on Computer Innovation

    OpenAIRE

    Ruihui Mu

    2015-01-01

    Case analysis to identify innovative strategies for food security occurred in the Oriental Hotel, voluntarily implement food safety control. Food security strategy investigation and the reasons for their use of multiple data sources, including accommodation and catering industry to implement and document interviews with key decision makers in the hotel performed to observe the business environment were examined. This finding suggests that addressing food security, not only is the food control...

  6. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are (i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, (ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and (iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project.

  7. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    International Nuclear Information System (INIS)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project

  8. Energy security strategy and nuclear power

    International Nuclear Information System (INIS)

    Toichi, Tsutomu; Shibata, Masaharu; Uchiyama, Yoji; Suzuki, Tatsujiro; Yamazaki, Kazuo

    2006-01-01

    This special edition of 'Energy security strategy and nuclear power' is abstracts of the 27 th Policy Recommendations 'The Establishment of an International Energy Security System' by the Japan Forum on International Relations, Inc on May 18 th , 2006. It consists of five papers: Energy security trend in the world and Japan strategy by Tsutomu Toichi, Establishment of energy strategy supporting Japan as the focus on energy security by Masaharu Shibata, World pays attention to Japan nuclear power policy and nuclear fuel cycle by Yoji Uchiyama, Part of nuclear power in the energy security - the basic approach and future problems by Tatsujiro Suzuki, and Drawing up the energy strategy focused on the national interests - a demand for the next government by Kazuo Yamazaki. (S.Y.)

  9. OBSERVABILITY-IN-DEPTH: AN ESSENTIAL COMPLEMENT TO THE DEFENSE-IN-DEPTH SAFETY STRATEGY IN THE NUCLEAR INDUSTRY1

    Directory of Open Access Journals (Sweden)

    FRANCESCA M. FAVARÒ

    2014-12-01

    We examine several “event reports” from the U.S. Nuclear Regulatory Commission database, which illustrate specific instances of violation of the observability-in-depth safety principle and the consequences that followed (e.g., unmonitored releases and loss of containments. We also revisit the Three Mile Island accident in light of the proposed principle, and identify causes and consequences of the lack of observability-in-depth related to this accident sequence. We illustrate both the benefits of adopting the observability-in-depth safety principle and the adverse consequences when this principle is violated or not implemented. This work constitutes a first step in the development of the observability-in-depth safety principle, and we hope this effort invites other researchers and safety professionals to further explore and develop this principle and its implementation.

  10. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper

  11. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  12. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  13. The National Security Strategy and National Interests: Quantity or Quality?

    National Research Council Canada - National Science Library

    Mercado, Leo

    2001-01-01

    The national security strategy (NSS), National Security Strategy for a New Century, published in December 1999, categorizes national interests as vital, important, and humanitarian and other interests...

  14. Security Problems of Communicative Strategies

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available The main directions of safety formation in communication strategies are connected with their adaptation to the conditions of social and psychological variability. Building up a communicative strategy is a versatile process, in which it is necessary to consider a wide spectrum of social and psychological parameters, especially topical in the modern period of social development. Forms of social interactions in schematic formats of contemporary social and economic revolution are reduced, social and functional potentials are depleted, mass society is further differentiating, the pace of historic changes is growing, all this determines the necessity to prepare changes in personality structures to the dynamics of social and fluidity.

  15. Spacepower for Australias Security - Grand Strategy or Strategy of Grandeur

    Science.gov (United States)

    2012-06-01

    2000), 34–35; Also see Peter H Diamandis and Steven Kotler , Abundance: The Future Is Better Than You Think (New York: Free Press, 2012... Kotler . Abundance: The Future Is Better Than You Think. New York: Free Press, 2012. DOD. “National Security Space Strategy -Unclassified Summary

  16. A Framework for Seismic Design of Items in Safety-Critical Facilities for Implementing a Risk-Informed Defense-in-Depth-Based Concept

    Directory of Open Access Journals (Sweden)

    Tatsuya Itoi

    2017-05-01

    Full Text Available Recently, especially after the 2011 off the Pacific coast of Tohoku earthquake and the Fukushima Daiichi nuclear power plant accident, the need for treating residual risks and cliff-edge effects in safety-critical facilities has been widely recognized as an extremely important issue. In this article, the sophistication of seismic designs in safety-critical facilities is discussed from the viewpoint of mitigating the consequences of accidents, such as the avoidance of cliff-edge effects. For this purpose, the implementation of a risk-informed defense-in-depth-based framework is proposed in this study. A basic framework that utilizes diversity in the dynamic characteristics of items and also provides additional seismic margin to items important for safety when needed is proposed to prevent common cause failure and to avoid cliff-edge effects as far as practicable. The proposed method is demonstrated to be effective using an example calculation.

  17. US National Security Strategy and preemption

    International Nuclear Information System (INIS)

    Kristensen, H.M.

    2006-01-01

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  18. Safety Culture as a Pillar of Defense-in-Depth Implementation at the Experimental Fuel Element Installation, Batan Indonesia

    Energy Technology Data Exchange (ETDEWEB)

    Hardiyanti, H.; Herutomo, B.; Suryaman, G.K., E-mail: hrdyanti@batan.go.id [Center for Nuclear Fuel Technology – National Nuclear Energy Agency (BATAN) Tangerang (Indonesia)

    2014-10-15

    Defence-in-depth (DID) needs to be implemented not only in a nuclear power plant, but also in a non-reactor nuclear facility. The application of safety culture in a nuclear facility is one way of DID implementation. Safety culture aims at the performance of safe works, the prevention of deviation, and the accomplishment of quality operation. It is in accordance with the first level of DID concept which is the prevention of abnormal operation and failures that is done through conservative design and high quality in construction and operation. Experimental Fuel Element Installation (EFEI) is a nonreactor nuclear facility that belongs to BATAN (the National Nuclear Energy Agency of the Republic of Indonesia) that functions as its research and development facility on power reactor fuel production. The objective of safety culture implementation in the EFEI is to encourage workers to have a stronger sense of responsibility on safety and to contribute actively for its development. The enhancement of safety culture in the EFEI refers to the attributes of a strong safety culture listed in the IAEA Safety Standard Series No.GS-G-3.5 (The Management System for Nuclear Installations Safety Guide). The strategies performed were: a) Internalization of safety values through activities such as briefings, “coffee morning”, visual management, workshops, and training; b) Enhancement of leadership effectiveness through activities such as senior management visits, safety leadership training, and personnel qualification training; c) Integration of safety into all work processes through activities such as setting up HIRADC (hazard identification, risk assessment, and determining controls) documents, setting up WHA (workplace hazard assessment), and routine housekeeping; d) Learning about safety through activities such as occupational health and safety inspections, safety self-assessments, open reporting on safety incidents, and participation in the FINAS (fuel incident notification

  19. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  20. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    National military strategy involves evaluating all elements of power, analyzing their capabilities and limitations, and incorporating these tools into a course of military action to secure political goals...

  1. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    .... The privatization and outsourcing of activities that were once solely the province of sovereign governments provide challenges and opportunities to planners and analysts involved in national security strategy...

  2. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  3. Why Europe needs a new European Security Strategy

    NARCIS (Netherlands)

    Drent, M.E.; Landman, Lennart

    2012-01-01

    Next year, the European Security Strategy: A Secure Europe in a Better World will be ten years old. Both the European Union and the world around it have changed in that time. In this Clingendael Policy Brief Margriet Drent and Lennart Landman argue that the European Union's foreign and security

  4. Assessing Information Security Strategies, Tactics, Logic and Framework

    CERN Document Server

    Vladimirov, Andrew; Michajlowski, Andriej

    2010-01-01

    This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws.

  5. Drie nationale cyber security strategieën vergeleken

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2011-01-01

    Onafhankelijk van elkaar brachten Frankrijk, Duitsland en Nederland hun nationale cyber security strategieën vrijwel tegelijk uit. De strategieën hebben overeenkomsten, maar tonen ook grote verschillen. De drie landen onderkennen een urgente noodzaak om cyber security aan te pakken, maar hebben

  6. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  7. Threat Prioritization Process for the Czech Security Strategy Making

    Directory of Open Access Journals (Sweden)

    Milos Balaban

    2012-06-01

    Full Text Available This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself. It is paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the “catalogue” approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need. It is also the 2011 final paper of the project “Trends, Risks, and Scenarios of the Security Developments in the World, Europe, and the Czech Republic – Impacts on the Policy and Security System of the Czech Republic” (TRS / VG20102013009.

  8. Synthesis of securement device options and strategies

    Science.gov (United States)

    2002-03-01

    The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...

  9. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  10. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  11. SECURITY STRATEGIES OF MEMBER STATES OF THE EUROPEAN UNION FROM THE LISBON TREATY AND THE EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    PABLO RIVAS PARDO

    2017-09-01

    in mind, it is possible to study the variability of the Security Strategy in relation to four strategic guidelines: strategic self-perception, the necessity to tune these postulates with the common objectives of the European Union, the statement of threats and finally the actions projected by these strategies to face the changing environment of international security. This variability will seek the fact of the existence or nonexistence of tuning and consistency between the Security Strategies and the community positions in the matter of security and defense. The selected countries are those who have published their documents after the signing of the Treaty of Lisbon and the publication of the European Security Strategy, in other words, after2009: Austria, Bulgaria, Slovenia, Spain, Estonia, Holland, Hungary, Lithuania, UK and the Czech Republic.

  12. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ...) and the North Atlantic Treaty Organization (NATO). Polish security policy and strategy is shaped by its geographical location, which places Poland in NATO's main strategic area opposite the Russian Federation and Belarus...

  13. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  14. It's Time for a National Energy Security Strategy

    National Research Council Canada - National Science Library

    Wright, George G

    2008-01-01

    .... can preserve that standing in the world. Colonel Greg Wright argues that what is needed to retain our military and economic superpower advantage is a new overarching United States National Energy Security Strategy...

  15. Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

    Directory of Open Access Journals (Sweden)

    Liu Qian

    2017-01-01

    Full Text Available For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel, therefore the security and trusted degree of lightweight virtualization container isolation mechanism is critical for the promotion of lightweight virtualization service. Because the user cannot directly participate in the process of the construction and management of container isolation mechanism, it is difficult for them to establish confidence in the security and trusted degree of container isolation mechanism. Based on the research and analysis of system credible and virtualization isolation mechanism, this paper puts forward a set of lightweight virtualization security isolation strategy mechanism, divides lightweight virtualization container storage address space into several parts, puts forward the definition of lightweight virtualization security isolation, gives the formal description and proof of container security isolation strategy, and combines with related technology to verify the feasibility of lightweight virtualization security isolation strategy mechanism. The mechanism has important guiding significance for cloud services providers to deploy container security isolation.

  16. Computing security strategies in finite horizon repeated Bayesian games

    KAUST Repository

    Lichun Li

    2017-07-10

    This paper studies security strategies in two-player zero-sum repeated Bayesian games with finite horizon. In such games, each player has a private type which is independently chosen according to a publicly known a priori probability. Players\\' types are fixed all through the game. The game is played for finite stages. At every stage, players simultaneously choose their actions which are observed by the public. The one-stage payoff of player 1 (or penalty to player 2) depends on both players types and actions, and is not directly observed by any player. While player 1 aims to maximize the total payoff over the game, player 2 wants to minimize it. This paper provides each player two ways to compute the security strategy, i.e. the optimal strategy in the worst case. First, a security strategy that directly depends on both players\\' history actions is derived by refining the sequence form. Noticing that history action space grows exponentially with respect to the time horizon, this paper further presents a security strategy that depends on player\\'s fixed sized sufficient statistics. The sufficient statistics is shown to consist of the belief on one\\'s own type, the regret on the other player\\'s type, and the stage, and is independent of the other player\\'s strategy.

  17. Finger multibiometric cryptosystems: fusion strategy and template security

    Science.gov (United States)

    Peng, Jialiang; Li, Qiong; Abd El-Latif, Ahmed A.; Niu, Xiamu

    2014-03-01

    We address two critical issues in the design of a finger multibiometric system, i.e., fusion strategy and template security. First, three fusion strategies (feature-level, score-level, and decision-level fusions) with the corresponding template protection technique are proposed as the finger multibiometric cryptosystems to protect multiple finger biometric templates of fingerprint, finger vein, finger knuckle print, and finger shape modalities. Second, we theoretically analyze different fusion strategies for finger multibiometric cryptosystems with respect to their impact on security and recognition accuracy. Finally, the performance of finger multibiometric cryptosystems at different fusion levels is investigated on a merged finger multimodal biometric database. The comparative results suggest that the proposed finger multibiometric cryptosystem at feature-level fusion outperforms other approaches in terms of verification performance and template security.

  18. Strategy and management of network security at KEK

    International Nuclear Information System (INIS)

    Kiyoharu Hashimoto; Teiji Nakamura; Hitoshi Hirose, Yukio Karita; Youhei Morita; Soh Suzuki; Fukuko Yuasa

    2001-01-01

    Recently the troubles related to the network security have often occurred at KEK. According to their security policy, the authors have started the strategy against the daily attacks. It consists of two fundamental things; the monitoring and the access control. To monitor the network, the authors have installed the intrusion detection system and have managed it since 1998. For the second thing, the authors arranged three categories to classify all hosts (about 5000 hosts) at KEK according to their security level. To realize these three categories, the authors filter the incoming packet from outside KEK whether it has a SYN flag or not. The network monitoring and the access control produced good effects in keeping the security level high. Since 2000 the authors have started the transition of LAN from shared-media network to switched network. Now almost part of LAN was re-configured and in this new LAN 10 Mbps 100 Mbps/1Gbps Ethernet are supported. Currently the authors are planning further speedup (10 Gbps) and redundancy of network. Not only LAN but also WAN, network speed will be upgraded to 10 Gbps thanks to the strong promotion of IT by Japanese government. In this very high speed network, the authors' current strategy will be affected and again the network security becomes a big issue. The authors describe the experiences in practice of the current strategy and management know-how together with the discussion on the new strategy

  19. CHINA’S STRATEGY OF ENERGY SECURITY IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Xing Li

    2013-01-01

    Full Text Available U.S.recently launched strategy of rebalancing to Asia worsens the atmosphere forChina’s energy security and increases the risks for energy transportation from Africa and theMiddle East. The diversification of energy sources is a reasonable strategic choice, so the importance of the Eurasian continent forChinaincreases. Central Asia does not play anymore a supporting role in the agenda ofChina’s energy security strategy. It is rather becoming a region of major strategic importance.

  20. Parents' experience of hospitalization: different strategies for feeling secure.

    Science.gov (United States)

    Kristensson-Hallström, I; Elander, G

    1997-01-01

    Twenty parents of boys (ages 2-14 years) hospitalized for hypospadias repair in a pediatric surgery department in Sweden, were interviewed concerning their experience when their child was hospitalized. A qualitative analysis of the interviews indicated that the most important issue to the parents was finding security at the hospital. Parents manifested one of three different strategies that enabled them to feel secure at the hospital; (a) relinquishing the care of their children to the nursing staff; (b) obtaining a measure of control over their children's care; and (c) relying on knowing their child best. The parental strategy adopted to feel secure was found to correspond with the way parents experienced the hospitalization. Differences were found in their children's experiences of pain and the alleviation of the pain during the hospitalization.

  1. Computing security strategies in finite horizon repeated Bayesian games

    KAUST Repository

    Lichun Li; Langbort, Cedric; Shamma, Jeff S.

    2017-01-01

    in the worst case. First, a security strategy that directly depends on both players' history actions is derived by refining the sequence form. Noticing that history action space grows exponentially with respect to the time horizon, this paper further presents a

  2. Citizen-based Strategies to Improve Community Security: Working ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Citizen-based Strategies to Improve Community Security: Working with Vulnerable Populations to Address Urban Violence in Medellin ... Water Resources Association, in close collaboration with IDRC, is holding a webinar titled “Climate change and adaptive water management: Innovative solutions from the Global South”.

  3. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  4. Household food security status and coping strategies of rural ...

    African Journals Online (AJOL)

    Household food security status and coping strategies of rural dwellers in Irewole local government areas of Osun State. CG Ajala. Abstract. No Abstract. Bowen Journal of Agriculture Vol. 3 (2) 2006: pp. 192-199. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  5. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  6. Synergy in the areas of NPP nuclear safety and nuclear security

    International Nuclear Information System (INIS)

    Dybach, A.M.; Kuzmyak, I.Ya.; Kukhotskij, A.V.

    2013-01-01

    The paper considers the question of synergy between nuclear safety and nuclear security. Special attention is paid to identifying interface of the two areas of safety and definition of common principles for nuclear security and nuclear safety measures. The principles of defense in depth, safety culture and graded approach are analyzed in detail.Specific features characteristic of nuclear safety and security are outlined

  7. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  8. Universal compliance: The Carnegie Endowment's new strategy for nuclear security

    International Nuclear Information System (INIS)

    Gottemoeller, R.

    2005-01-01

    I would like to give a short briefing on Universal Compliance, the Carnegie Endowment's new strategy for nuclear security. It contains our recommendations for a new, effective nuclear non-proliferation strategy, set out against a description of the rapidly evolving security environment. I will begin with a description of that environment, but first I would like to remind you of the process that we followed in producing this report: - We launched a draft of the report at the Carnegie International Nonproliferation Conference in June 2004. In the months afterwards we sought comments and expert opinion from experts in the United States of America and around the world - we visited 15 countries. We truly tried to get comments from the broadest possible community. - I would also like to emphasize that this was a team effort, involving our President, Jessica Mathews, and four other senior experts at the Endowment

  9. The Nuclear Imperative in Russia’s Security Strategy

    Directory of Open Access Journals (Sweden)

    J. Oscar Alvarez Calzada

    2005-10-01

    Full Text Available The process which culminated in the disappearance of the USSR was heavily influenced by that Soviet Union’s inability to maintain the level of technology reached by the US in the arms race. Under the circumstances of deteriorating Russian power which have been developing since 1991, and given the precariousness that affects its armed forces, nuclear weapons have become the core element of the Russian Federation’s national security strategy. This article explores the causes that have led to this nuclear imperative in Russia’s security strategy; and secondly, it presents the most relevant, and worrying, consequence that this dependence has generated, which is the lowering of the threshold necessary forthe use of nuclear weapons.

  10. The new terrorism and the American national security strategy : implications for Turkey's security

    OpenAIRE

    Türe, Nail

    2004-01-01

    Cataloged from PDF version of article. This thesis analyzes the consequences of the American National Security Strategy, carried out as part of the post September 11 ‘war on terrorism’, in terms of Turkey’s security. Whether the reasons or aims of a declaration of war on terrorism are right or not, the reality is that the U.S. has made important steps with significant implications for the whole world as well as for Turkey. Terrorism, which has changed some of its features by th...

  11. Balanced Scorecard: A Strategic Tool in Implementing Homeland Security Strategies

    OpenAIRE

    Caudle, Sharon

    2008-01-01

    This article appeared in Homeland Security Affairs (October 2008), v.4 no.3 Starting in the early 1990s, Robert S. Kaplan and David P. Norton advocated a 'balanced scorecard' translating an organization's mission and existing business strategy into specific strategic objectives that could be linked in cause and effect relationships and measured operationally. The balanced scorecard stressed drivers of future organizational performance -- capabilities, resources, and business processes -- a...

  12. A Security Assessment Approach with Graded Importance Score of Security Controls and Asset Consequence for I and C Systems in Operating NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sooill; Kim, Yong Sik; Moon, Insun; Lee, Euijong [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    This paper introduces a security assessment approach with graded importance score of security controls and the asset consequence through an asset and risk analysis to manage the security levels in operating NPPs (Nuclear Power Plants). Whereas, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. U.S. NRC(United States Nuclear Regulatory Commission) and KINAC(Korea Institute of Nuclear Nonproliferation And Control) request the cyber security plan by establishing the cyber security program through assessing and managing the potential for adverse effect on safety, security and emergency preparedness functions so as to provide high assurance that critical functions are properly protected from the cyber-attack. This paper shows the security assessment approach with graded importance score of security controls and the asset consequence. It could lead to manage the security levels consistent with the purpose of defense in- depth strategy based on regulatory rule as well as internal risk-based self-assessment. Also, this management of the security level may make effect of encouraging the installation of high ranked countermeasures in order to rapidly increase the security level. Proposed approach could be conducted for the pilot test on the model plants with each reactor type of operating NPPs.

  13. A Security Assessment Approach with Graded Importance Score of Security Controls and Asset Consequence for I and C Systems in Operating NPPs

    International Nuclear Information System (INIS)

    Lee, Sooill; Kim, Yong Sik; Moon, Insun; Lee, Euijong

    2016-01-01

    This paper introduces a security assessment approach with graded importance score of security controls and the asset consequence through an asset and risk analysis to manage the security levels in operating NPPs (Nuclear Power Plants). Whereas, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. U.S. NRC(United States Nuclear Regulatory Commission) and KINAC(Korea Institute of Nuclear Nonproliferation And Control) request the cyber security plan by establishing the cyber security program through assessing and managing the potential for adverse effect on safety, security and emergency preparedness functions so as to provide high assurance that critical functions are properly protected from the cyber-attack. This paper shows the security assessment approach with graded importance score of security controls and the asset consequence. It could lead to manage the security levels consistent with the purpose of defense in- depth strategy based on regulatory rule as well as internal risk-based self-assessment. Also, this management of the security level may make effect of encouraging the installation of high ranked countermeasures in order to rapidly increase the security level. Proposed approach could be conducted for the pilot test on the model plants with each reactor type of operating NPPs

  14. FINANCIAL-ECONOMICAL ENTERPRISE SECURITY STRATEGY FORMING IN THE TERMS OF UNCONFORMITY

    Directory of Open Access Journals (Sweden)

    Galyna Mykhayliv

    2016-03-01

    Full Text Available Theoretical points as for definition of “financial-economical security” have been researched and summing up. The present attitude were analyzed as for the financial-economical enterprise security forming in the terms of unconformity and system attitude necessity stipulated for strategy system management by a financial-economical enterprise security. Keywords: financial-economical enterprise security, strategy management, financial security, economical security, financial stability, economical security, external JEL: M 20

  15. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  16. Applications for cyber security - System and application monitoring

    International Nuclear Information System (INIS)

    Marron, J. E.

    2006-01-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  17. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  18. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  19. Maternal Strategies to Access Food Differ by Food Security Status.

    Science.gov (United States)

    Gorman, Kathleen S; McCurdy, Karen; Kisler, Tiffani; Metallinos-Katsaras, Elizabeth

    2017-01-01

    Household food insecurity is associated with health and behavior risk. Much less is known about how food insecurity is related to strategies that adults use in accessing food: how and where they shop, use of alternative food sources, and their ability to manage resources. To examine how maternal behaviors, including shopping, accessing alternative sources of food, and managing resources, are related to household food security status (HHFSS). Cross-sectional study collecting survey data on HHFSS, shopping behaviors, use of alternative food sources, and managing resources obtained from low-income mothers of preschool-aged children. One hundred sixty-four low-income mothers of young children (55% Hispanic) from two communities in Rhode Island. HHFSS was measured using 10 items from the 18-item Core Food Security Module to assess adult food security. Mothers were surveyed about where, when, and how often they shopped; the strategies they use when shopping; their use of alternative sources of food, including federal, state, and local assistance; and their ability to manage their resources. Analysis of variance and χ 2 analyses assessed the associations between demographic variables, shopping, accessing alternative food sources, and managing resources, and HHFSS. Multivariate logistic regression assessed the associations between HHFSS and maternal demographic variables, food shopping, strategies, alternative sources of food, and ability to manage resources. Maternal age and language spoken at home were significantly associated with HHFSS; food insecurity was 10% more likely among older mothers (adjusted odds ratio [aOR] 1.10, 95% CI 1.03 to 1.17) and 2.5 times more likely among Spanish-speaking households (compared with non-Spanish speaking [aOR 3.57, 95% CI 1.25 to 10.18]). Food insecurity was more likely among mothers reporting more informal strategies (aOR 1.98, 95% CI 1.28 to 3.01; P<0.05) and perceiving greater inability to manage resources (aOR 1.60, 95% CI 1

  20. Minapadi Development Strategy in Supporting National Food Security

    Science.gov (United States)

    Lestari, Sri; Bambang, Azis Nur

    2018-02-01

    Efforts to achieve food security, especially food self-sufficiency, face severe challenges. Intensification needs to be done in optimizing the existing land by applying integrated agriculture. One of them is by integrating agriculture and fishery aspect with implementation of minapadi. Minapadi cultivation has actually grown since a long time, but in the course of time this system Began displaced because of pesticides and chemical fertilizers. Become flagship Minapadi back in line with the increasing public awareness of the importance of sustainable environment, health, increasing demand for organic products that are free from pesticide residues which means safe for consumption. Minapadi is the answer to the fulfillment of people's need for carbohydrate and protein food. Blending the fulfillment of carbohydrates is rice as the staple food of most people with the fulfillment of animal protein from fish commodities to add nutritional value. In realizing the food security strategy is required Minapadi development. This descriptive research aims to find out various minapadi development strategies in several regions with different methods based on the literature and previous studies. The result is the formulation of minapadi development strategy in an area not necessarily can be applied in other areas.This occurs because of differences in setting criteria/ variables based on the characteristics and potential of a region, the strengths and opportunities, as well as the weaknesses and threats that the area may encounter.

  1. Defining a List of Accidents to be Considered as a First Step of Forging Effective Level 4 of Defense-in Depth

    Energy Technology Data Exchange (ETDEWEB)

    Lankin, M., E-mail: lankin@secnrs.ru [Scientific and Engineering Center for Nuclear and Radiation Safety, Moscow (Russian Federation)

    2014-10-15

    Russian national regulatory documents require consideration of beyond design basis accidents (BDBAs) while organizing defence-in-depth for nuclear power plants. Consideration of BDBAs in plant design analysis forms the basis for development accident prevention and mitigation strategies. Since sheer quantity of possible beyond design basis accidents is limitless, we face a necessity of working out selection criteria for choosing scenarios of such accidents to be taken into consideration while assessing adequacy of Level 4 of Defence-in-Depth for NPPs. This paper presents possible algorithm for defining a list of beyond design basis accidents that are to be taken into account for NPPs. Developing such a list is to include examination of the following criteria: a) Representativity of set of scenarios covered by the list (representativity to be assessed from the point of view of organizing emergency response actions); b) Cumulative occurrence probability of the scenarios not covered by the list (this probability should be low); and c) Necessity to cover scenarios recommended by current international state-of the art practices. (author)

  2. Cyber Security Test Strategy for Non-safety Display System

    International Nuclear Information System (INIS)

    Son, Han Seong; Kim, Hee Eun

    2016-01-01

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures

  3. Cyber Security Test Strategy for Non-safety Display System

    Energy Technology Data Exchange (ETDEWEB)

    Son, Han Seong [Joongbu University, Geumsan (Korea, Republic of); Kim, Hee Eun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures.

  4. Assessing information security strategies, tactics, logic and framewortk

    CERN Document Server

    Vladimirov, Andrew; Gavrilenko, Konstantin

    2015-01-01

    Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that

  5. Modeling Turkey’s future LNG supply security strategy

    International Nuclear Information System (INIS)

    Efe Biresselioglu, Mehmet; Hakan Demir, Muhittin; Kandemir, Cansu

    2012-01-01

    Turkey was among those countries which decided to increase its natural gas consumption in the 1990s, due to its relative low cost and lack of impact on the environment. However, a heavy dependence on imports, from Algeria, Qatar and Nigeria, respectively, creates a threat to energy security, both in terms of source and supply diversity. Accordingly, we follow an analytical approach to identify the accuracy of our assumption, considering the current economic, political and security risk. To this end, we formulate and solve a mixed integer programming model that determines the optimal sourcing strategy for Turkey’s increasing LNG demand. This model demonstrates a number of alternative policy options for LNG supply. Furthermore, we consider that increasing the proportion of LNG in the overall gas supply will contribute to the aim of improving Turkey’s level of energy security. - Highlights: ► Turkey’s best policy option is to increase the share of LNG. ► Turkey’s main suppliers of LNG will be Algeria, Egypt, Nigeria, and Trinidad and Tobago. ► Norway, Libya, and Oman contribute to the supply with rather smaller shares. ► With high risk scenario Algeria, Egypt, Nigeria and Libya will not be suppliers. ► Oman and Qatar will cover; even though they are high-cost suppliers.

  6. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  7. Energy access and security strategies in Small Island Developing States

    International Nuclear Information System (INIS)

    Wolf, Franziska; Surroop, Dinesh; Singh, Anirudh; Leal, Walter

    2016-01-01

    Small Islands Developing States (SIDS) are isolated and surrounded by ocean. The generation and use of energy resources are two very important aspects for the development of SIDS. Unfortunately, most of SIDS do not use their potential in respect of energy resources, and they as a result have to depend on the import of fossil fuels in order to meet their energy needs. This increases the overall vulnerability of SIDS as they have to depend on the rising or fluctuating fossil fuels prices. Some SIDS, especially in the geographically dispersed Pacific region, do not have proper access to energy whereas other SIDS struggle more with energy security issue. At the same time, SIDS are most vulnerable to the impacts and effects of climate change, as they are among the ones to be most severely affected in case of natural calamities and sea-level rise. Drawing on experiences from Fiji and Mauritius, this paper explains core elements related to energy access and security in SIDS, contextualizes and discusses barriers and list some of the strategies that may be used to ensure access to and a continuous supply of energy in SIDS. A situational analysis of two SIDS outlines their current energy situation and compares their energy policies to globally accepted criteria for SIDS policies as well as with each other. It is claimed that the diverging energy performances of Fiji and Mauritius cannot be explained by policies differences. The reasons for the varying energy performances may therefore lie in the administrative and institutional mechanisms used by the two countries in implementing their energy policies. Finally, to enable SIDS to reduce their overall vulnerability and become truly sustainable islands, it is recommended to undertake careful assessments of the particular local contexts under which island energy regimes operate. - Highlights: • Core elements related to energy access/security in SIDS, barriers and strategies. • Situational analysis of two SIDS: Fiji and

  8. Toward an energy security strategy for Canada : a discussion paper

    International Nuclear Information System (INIS)

    2005-12-01

    Energy security strategies for Canada were presented in this paper. Article 6.05 of North American Free Trade Agreement (NAFTA) prohibits Canada from reducing the proportion of energy exported to the United States or Mexico. Between 1982 and 2002, natural gas consumption in Canada rose by 96 per cent while exports increased by 396 per cent. Crude oil consumption increased by 29 per cent, while exports rose by 595 per cent. Government practices have tended towards extracting and exporting resources as quickly as possible with no consideration to resource availability for future generations. In addition, much of the value of Canadian resources has been given to private corporations. The environment has been damaged in order to enable faster extraction, and First Nations, employees, and communities have been placed at the mercy of corporations and international markets. Canada's unique cultural and societal arrangements have not been protected. Four principles to address these concerns were presented: (1) managing non-renewable resources as responsible stewards and conserving their economic availability for future generations; (2) ensuring that the benefits from fossil fuels are invested in other forms of capital that will ensure the future prosperity and energy security of Canada; (3) ensuring that the extraction and use of resources has minimal impacts on the planet and (4) a re-direction of the proceeds from resource exploitation towards education, social and health services, land claims and land use settlements, and the elimination of poverty among First Nations people. It was suggested that energy-related jobs and workers should be protected through the development of an industrial strategy which includes investment in renewable energy development and re-training programs for workers. Consistent depoliticized policies are needed to reduce the impact on low-income Canadians of free-market price swings and the unavoidable costs of environmental protection. It was

  9. Turkey’s Strategy towards Afghanistan: Security and Development Assistance

    Directory of Open Access Journals (Sweden)

    Altunay Ilgar Aliyeva

    2016-01-01

    Full Text Available Providing assistance to the least developed countries has remained one of the top priorities for leading international actors in the XXI century, and the Republic of Turkey is no exception in this regard. The Justice and Development Party's ascension to power in 2002 led to a drastic revision of the Turkish foreign policy and adoption of a novel approach to the least developed countries accounting for the complex interdependence between security and development. This approach was tested in Afghanistan where Turkey contributed to both post-conflict reconstruction of the country and to the activities of the International Security Assistance Force (ISAF. Since 2015 Turkey has been actively engaged in the new NATO 'Resolute Support' mission, while continuing its economic support to Afghanistan on bilateral and multilateral basis. This paper aims to unveil the particularities of the Turkey's Afghan strategy, which has yet escaped the Russian scholars' attention, with the help of the Turkish primary sources and academic works. It studies the specificity of bilateral relations and their determinants, including historic ties and religious and cultural proximity. It provides an in-depth analysis of the activities of both Turkish Cooperation and Development Agency (TIKA and the Turkish Provincial Reconstruction Team (PRT in Afghanistan and examines the challenges of Turkish troops' presence on the Afghan soil and the way how the Turkish elites and Turkey's NATO allies perceive it.

  10. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  11. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  12. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  13. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  14. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  15. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  16. Nuclear non-proliferation and security culture within EDF nuclear fleet

    International Nuclear Information System (INIS)

    Debes, M.

    2013-01-01

    This document describes the nuclear non-proliferation strategy and the safety culture of EDF. The author lists all the mandatory rules and regulations at international and national levels EDF has to comply with. All these requirements are applied in EDF nuclear facilities through adequate procedures that assure a nuclear material accountancy, a follow-up of any item containing nuclear material in the facility, and internal controls. External independent controls are also performed. The EDF security policy goal is to protect human, material and knowledge assets, and to preserve operational capacity, competitiveness and public confidence, within national regulatory framework and regulation on 'vital importance facilities'. The treatment of events or incident (detection, analysis, lessons drawn, experience feedback) is a tool to progress, along with reporting, internal control process and audits. The security requirements cover the different related domains important to EDF industrial assets: security of employees against assaults; security of data according to their sensibility level; security of the information system and telecom; awareness and training of employees; relations with external suppliers or contractors; business premises; security of staff and projects abroad. For industrial facilities and grids (facilities of 'vital importance'...), the defense in depth principles are applied against the different threat scenarios. Security measures are studied at the design stage in a consistent way with nuclear safety measures, while taking into account the protective means deployed by public authorities. These risk analysis are periodically reassessed. The paper is followed by the slides of the presentation. (A.C.)

  17. 75 FR 18819 - Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and...

    Science.gov (United States)

    2010-04-13

    ... a cyber attack. 2. It is essential that those parts or equipment of the Smart Grid that optimize the...-0143-01] Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and... (NIST) seeks comments on the second draft of NISTIR 7628, Smart Grid Cyber Security Strategy and...

  18. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  19. Safety strategy

    International Nuclear Information System (INIS)

    Schultheiss, G.F.

    1980-01-01

    The basis for safety strategy in nuclear industry and especially nuclear power plants is the prevention of radioactivity release inside or outside of the technical installation. Therefore either technical or administrative measures are combined to a general strategy concept. This introduction will explain in more detail the following topics: - basic principles of safety - lines of assurance (LOA) - defense in depth - deterministic and probabilistic methods. This presentation is seen as an introduction to the more detailed discussion following in this course, nevertheless some selected examples will be used to illustrate the aspects of safety strategy development although they might be repeated later on. (orig.)

  20. A Proven Methodology for Developing Secure Software and Applying It to Ground Systems

    Science.gov (United States)

    Bailey, Brandon

    2016-01-01

    Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?

  1. Qualitative Characterization of the Facebook Information Security Strategies

    Directory of Open Access Journals (Sweden)

    LOPES, S. F.

    2015-12-01

    Full Text Available Hyperconnectivity due to online social networks exposed security issues on data stored in these systems. This article presents an analysis on how online social networks designers have been communicating information security aspects through these systems’ interfaces. This analysis was made using the Semiotic Inspection Method on Facebook since it is largely used in Brazil and all over the world. Results showed that there is major concern with security information properties. Nevertheless it was possible to identify interface problems that could compromise use and understanding of such security properties

  2. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  3. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  4. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  5. At the Crossroads: Counterproliferation and National Security Strategy

    National Research Council Canada - National Science Library

    2004-01-01

    .... national security and an enormous challenge for the entire international community. In the hands of rogue states, failing states, or substate terrorist groups, these weapons threaten not only U.S...

  6. Inherent Efficiency, Security Markets, and the Pricing of Investments Strategies

    NARCIS (Netherlands)

    Zou, L.; Kin, L.

    2000-01-01

    This paper applies the dichotomous theory of choice by Zou (2000a) tothe analysis of investmentstrategies and security markets. Issues concerning individualoptimality, (approximate) arbitrage,capital market equilibrium, and Pareto efficiency are studied undervarious market conditions. Among the main

  7. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  8. Solar Secure Schools: Strategies and Guidelines; October 2004--April 2005

    Energy Technology Data Exchange (ETDEWEB)

    Braun, G. W.; Varadi, P. F.

    2006-01-01

    This report explores the technical and economic aspects of installing solar power (photovoltaic aka PV) systems on schools to improve the schools' energy security and provide power during disasters.

  9. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    Science.gov (United States)

    2013-04-25

    cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From  -­‐  To)   September 2012 - April 2013 4.  TITLE  AND  SUBTITLE   Private Military and Security Companies - Counterinsurgency and

  10. Document and author promotion strategies in the secure wiki model

    DEFF Research Database (Denmark)

    Lindberg, Kasper; Jensen, Christian D.

    2012-01-01

    Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system......, but this also means that anyone can introduce errors into documents, either by accident or on purpose. A security model for wiki-style authoring systems, called the Secure Wiki Model, has previously been proposed to address this problem. This model is designed to prevent corruption of good quality documents......, by limiting updates, to such documents, to users who have demonstrated their ability to produce documents of similar or better quality. While this security model prevents all user from editing all documents, it does respect the wiki philosophy by allowing any author who has produced documents of a certain...

  11. Strategies to Minimize the Effects of Information Security Threats on Business Performance

    Science.gov (United States)

    Okoye, Stella Ifeyinwa

    2017-01-01

    Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…

  12. An Assessment of the United States National Security Strategy for Combating Terrorism

    National Research Council Canada - National Science Library

    Chambliss, John

    2004-01-01

    .... While terrorism may be simply viewed as a crime against humanity the United States must pursue a comprehensive policy and strategy to deal with such acts anywhere and anytime because they threaten its national security...

  13. National Security Strategy: A Flawed Guide to the Future, Political Science

    National Research Council Canada - National Science Library

    Leahy, Michael

    2003-01-01

    The Goldwater-Nichols Defense Department Reorganization Act of 1986 requires the executive branch to periodically provide written documentation of the United States National Security Strategy (NSS). The George W...

  14. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  15. The National Security Strategy of the United Kingdom: Security in an Interdependent World

    Science.gov (United States)

    2008-03-01

    security architecture has yet to adapt satisfactorily to the new landscape. The UN Security Council has failed to adapt to the rise of new powers. Across...including cinemas , theatres, pubs, nightclubs, restaurants, hotels and commercial centres, hospitals, schools and places of worship); work with architects...and export control regimes, and improving the international monitoring architecture . Countering the threat of nuclear weapons and other weapons of

  16. Food security status and coping strategies of rural households with ...

    African Journals Online (AJOL)

    Background: Food insecurity is a growing public health concern in Nigeria especially where all efforts towards achieving the Millennium Development Goal (MDG 1) of eradicating extreme hunger and poverty by 2015 is yet to be realized. This cross sectional study was designed to assess food security status of rural ...

  17. 360 PORT MDA - A Strategy to Improve Port Security

    Science.gov (United States)

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  18. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  19. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  20. Security strategy of powered-off SRAM for resisting physical attack to data remanence

    International Nuclear Information System (INIS)

    Yu Kai; Zou Xuecheng; Yu Guoyi; Wang Weixu

    2009-01-01

    This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered-off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25 μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.

  1. Energy Security Strategies: An Analysis of Tanzania and Mozambique

    Science.gov (United States)

    2016-06-01

    outsourcing of monitoring and enforcement of the accountability mechanism to the Extractive Industries Transparency Initiative (EITI) and the International ...strategy, and international relationships. Analysis of the case studies indicates that the combination of political elite cohesion, economic reforms that...favor the domestic energy market, and structuring the influence of international actors in policy development enables the development of the domestic

  2. A security framework for nationwide health information exchange based on telehealth strategy.

    Science.gov (United States)

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  3. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  4. Children's perceptions of emotion regulation strategy effectiveness: links with attachment security.

    Science.gov (United States)

    Waters, Sara F; Thompson, Ross A

    2016-08-01

    Six- and nine-year-old children (N = 97) heard illustrated stories evoking anger in a story character and provided evaluations of the effectiveness of eight anger regulation strategies. Half the stories involved the child's mother as social partner and the other half involved a peer. Attachment security was assessed via the Security Scale. Children reported greater effectiveness for seeking support from adults and peers in the peer context than the mother context, but perceived venting as more effective with mothers. Children with higher security scores were more likely to endorse problem solving and less likely to endorse aggression in both social contexts than those with lower security scores. Early evidence for gender differences was found in that boys endorsed the effectiveness of distraction while girls endorsed venting their emotion.

  5. New nuclear power in the UK: A strategy for energy security?

    International Nuclear Information System (INIS)

    Watson, Jim; Scott, Alister

    2009-01-01

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  6. New nuclear power in the UK. A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim; Scott, Alister [Sussex Energy Group, SPRU, The Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security - the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made. (author)

  7. New nuclear power in the UK: A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim, E-mail: w.j.watson@sussex.ac.u [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom); Scott, Alister [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  8. Operating nuclear power stations in a regulated cyber security environment: a roadmap for success

    Energy Technology Data Exchange (ETDEWEB)

    Dorman, E., E-mail: Erik.Dorman@areva.com [AREVA Inc., Cyber Security Solutions, Charlotte, NC (United States)

    2015-07-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NRC. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. The Program is designed to protect critical digital assets (CDAs) by applying and maintaining defense-in depth protective strategies to ensure the capability to detect, respond to, and recover from cyber-attacks. The Program references NEI 08-09 R. 6, the Nuclear Energy Institute Template that provides guidance for applying Cyber Security controls derived from NIST 800-53/82 and slightly modified to fit the nuclear environment. Many mature processes are in place at nuclear facilities in response to numerous regulations implemented over the past 30 years. Many of these processes such as the Physical Security Program offer protections that are leveraged to protect the functions of critical digital assets from unauthorized physical access. Other processes and technology such as engineering design control, work management and pre-job briefs, control of portable media and mobile devices, and deterministically segregated networks protect critical digital assets. By leveraging the regulated nuclear environment, integrating NIST type Cyber Security controls, and prudently deploying technology the Cyber Security posture of operating nuclear facilities supports on-demand base load electricity 24/7 with capacity factors exceeding 85%. This paper is designed to provide a glimpse into Cyber Security Programs that support safe operation and reliability in the regulated nuclear environment while supporting the on-demand base load electricity production 24/7. (author)

  9. Operating nuclear power stations in a regulated cyber security environment: a roadmap for success

    International Nuclear Information System (INIS)

    Dorman, E.

    2015-01-01

    The United States Nuclear Regulatory Commission (NRC) issued 10CFR73.54 to implement a regulated Cyber Security Program at each operating nuclear reactor facility. Milestones were implemented December 31, 2012 to mitigate the attack vectors for the most critical digital assets acknowledged by the industry and the NRC. The NRC inspections have begun. The nuclear Cyber Security Plan, implemented by the site Cyber Security Program (Program), is an element of the operating license at each facility. The Program is designed to protect critical digital assets (CDAs) by applying and maintaining defense-in depth protective strategies to ensure the capability to detect, respond to, and recover from cyber-attacks. The Program references NEI 08-09 R. 6, the Nuclear Energy Institute Template that provides guidance for applying Cyber Security controls derived from NIST 800-53/82 and slightly modified to fit the nuclear environment. Many mature processes are in place at nuclear facilities in response to numerous regulations implemented over the past 30 years. Many of these processes such as the Physical Security Program offer protections that are leveraged to protect the functions of critical digital assets from unauthorized physical access. Other processes and technology such as engineering design control, work management and pre-job briefs, control of portable media and mobile devices, and deterministically segregated networks protect critical digital assets. By leveraging the regulated nuclear environment, integrating NIST type Cyber Security controls, and prudently deploying technology the Cyber Security posture of operating nuclear facilities supports on-demand base load electricity 24/7 with capacity factors exceeding 85%. This paper is designed to provide a glimpse into Cyber Security Programs that support safe operation and reliability in the regulated nuclear environment while supporting the on-demand base load electricity production 24/7. (author)

  10. Security Strategies of Both Players in Asymmetric Information Zero-Sum Stochastic Games with an Informed Controller

    KAUST Repository

    Li, Lichun; Langbort, Cedric; Shamma, Jeff S.

    2017-01-01

    that the security strategy only depends on the belief and the current stage. We provide LP formulations whose size is only linear in the size of the uninformed player's action set to compute both history based and belief based security strategies. For the uninformed

  11. Diversification of oil import sources and energy security. A key strategy or an elusive objective?

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2009-01-01

    This paper explores the relationship between the diversification of sources of imported oil and energy security of oil-importing countries. It examines the importance of diversification policy for oil importers, explains why oil importers implement oil diversification policy, and contextualizes the oil import diversification strategy in the overall energy security policy of oil importers. The paper analyzes the factors and the contexts that affect the level of importance assigned to oil import diversification policy in oil-importing countries, and the limitations that may affect the successful implication of oil import diversification policy. The examples are drawn from the world's top three oil importers, the United States, Japan, and China. The policymakers in these and other oil-importing countries place much importance on energy security. The diversification of oil import sources is used as one of the strategies to enhance energy security in oil-importing countries. This paper is important for policymakers in oil-importing countries as it provides them with a qualitative conceptual framework with which to evaluate the need to diversify their countries' sources of imported oil, and with which to identify the likely limitations to the successful implementation of oil import diversification policy. (author)

  12. US National Security Strategy and preemption; Le concept de preemption dans la strategie de securite nationale des Etats-Unis

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, H.M. [Federation of American Scientists, Washington, D.C. (United States)

    2006-07-15

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  13. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  14. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches  of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  15. Assessment and testing of industrial devices robustness against cyber security attacks

    International Nuclear Information System (INIS)

    Tilaro, F.; Copy, B.

    2012-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. CERN - in collaboration with Siemens - has designed and implemented a dedicated working environment, the Test-bench for Robustness of Industrial Equipment. Such tests attempt to detect possible anomalies by exploiting corrupt communication channels and manipulating the normal behavior of the communication protocols, in the same way as a cyber attacker would proceed. Our approach consists of analyzing protocol implementations by injecting malformed PDUs (Protocol Data Unit) to corrupt the normal behaviour of the system. As a PDU typically has many fields, the number of possible syntactically faulty PDUs grows exponentially with the number of fields. In this document, we proposed a strategy to explore this huge test domain using a hybrid approach of fuzzing and syntax techniques, specifically developed to evaluate industrial device communication robustness. So far, not all the tests can be integrated into automatic tools, human analysis and management is necessary to discover and investigate specific possible failures

  16. Strategy of Increasing Food Security based on Macro and Micro Aspects

    Directory of Open Access Journals (Sweden)

    Neni Widayaningsih

    2016-06-01

    Full Text Available The preliminary studies that have been conducted show that the food availability in 27 districts in Banyumas Regency on average is still low. The purpose of this research is to formulate of a strategy to improve the food security by synergizing the macro and micro aspects. The method used is the tabulation analysis, IFE and EFE Matrix, and also IE Matrix. The IE matrix shows the food security based on the macro and micro aspects that are in the first cell, which means that the food security conditions are experiencing the growing and buliding. The strategies of improving the food security from the micro and macro aspects are first, to develop the food production in accordance with the potential and comodities of the excellent food in accordance with the specializations of regions (districts. Second, it requires a partnership and a cooperation of distributing the excellent food production. Third, the investment is required to improve the diversification of food. Fourth, it requires the cooperation between the farmers and the government agencies concerned with the development, supply and service of excellent means of agricultural production with supervision and increased credit services. Fifth, the off-farm activities should be developed by forming the cooperatives or the small and household businesses on the basis of farming activities. Besides, in order to meet the consumption of food that is safe, qualified, and nutritious, it is necessary to increase the knowledge and awareness about the food security at the household level by empowering the cooperatives or small and household businesses by utilizing Dasa Wisma group, PKK, Majelis Ta'lim, and other non-governmental groups.

  17. Grand Strategy for the United States in the 21st Century? (A Look at the National Security Strategy Document of 2002 and Beyond)

    National Research Council Canada - National Science Library

    Tinsley, Peter G

    2005-01-01

    This paper examines the National Security Strategy (NSS) document of September 2002 and determines whether it provides a grand strategic framework that can be sustained for the rest of the Bush presidency and beyond...

  18. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ... as a core element of the Common Security and Defense Policy of the EU, Based on the interpretation of Clausewitz's theory of war and strategy in Britain, France, and Germany, main commonalities...

  19. Construction Strategies of Social Security System for Wan-jiang Urban Belt’s Migrant Workers

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Theoretical debate and practice exploration on social security of migrant workers were introduced.The political direction and security layer on social security for migrant workers in Wan-jiang urban belt were analyzed:the first layer is to implement wage payment guarantee and employment injury insurance;the second layer is to emphasize serious disease insurance and endowment insurance;the third layer is unemployed insurance and social assistance.The primary strategy of building a social security system for migrant workers in Wan-jiang urban belt was put up:wage payment guarantee system that is united in certain regions should be promoted;employment injury insurance system that is undertaken by enterprises should be built;a social health care system for serious diseases should be set up;multi-layers endowment insurance system for migrant workers should be created;vocational training and training in how to start a business should be built as well as the unemployment insurance system;social assistant system based on the basic cost of living allowances should be set up.

  20. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  1. Secure energy supply in 2025: Indonesia's need for an energy policy strategy

    International Nuclear Information System (INIS)

    Mujiyanto, Sugeng; Tiess, Günter

    2013-01-01

    Indonesia as an emerging country with one of the fastest growing economies requires sufficient supply with energy for national development. Domestic energy production cannot satisfy the domestic demand, and the deficiency necessitates growing imports. The present energy mix consists of 96% from non-renewable sources, i.e. fossil fuels, less than 4% from renewables. Government Regulation 5/2006 aims at increasing the proportion of renewable sources to 17%. Two scenarios for the energy situation in 2025 have been elaborated and are discussed. An overall energy policy strategy and regulatory framework covering non-renewable and renewable resources are crucial for securing energy demand. - Highlights: • Indonesia aims at 17% renewable energy in energy mix 2025. • Population growth exceeds increase of energy production. • Investment incentives for new technologies, exploration and efficient production are necessary. • Clear and comprehensive energy policy strategy and regulatory framework are crucial

  2. National security risks? Uncertainty, austerity and other logics of risk in the UK government’s National Security Strategy

    NARCIS (Netherlands)

    Hammerstad, A.; Boas, I.J.C.

    2015-01-01

    Risk scholars within Security Studies have argued that the concept of security has gone through a fundamental transformation away from a threat-based conceptualisation of defence, urgency
    and exceptionality to one of preparedness, precautions and prevention of future risks, some of which are

  3. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    Directory of Open Access Journals (Sweden)

    Elvin Shava

    2017-11-01

    Full Text Available This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three nongovernmental organisations (NGOs to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes.

  4. Deficit irrigation and sustainable water-resource strategies in agriculture for China's food security.

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J

    2015-04-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant's growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  5. Deficit irrigation and sustainable water-resource strategies in agriculture for China’s food security

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J.

    2015-01-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant’s growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. PMID:25873664

  6. Defense in Depth Added to Malicious Activities Simulation Tools (MAST)

    Science.gov (United States)

    2015-09-01

    5 a. Triple Data Encryption Standard (3DES)..............................13 b. Advanced Encryption Standard ( AES ...10 Figure 4. DES Encryption , from [5] ................................................................................12 Figure 5. AES Encryption ...Associated Data AES Advanced Encryption System CBC Cipher Block Chaining DES Data Encryption Standard DOD Department of Defense DSA Digital Signature

  7. The PSA assessment of Defense in Depth Memorandum and proposals

    International Nuclear Information System (INIS)

    Fiorini, Gian-Luigi; La Rovere, Stefano

    2016-01-01

    This report concerns the peculiar roles of the Defence-in-Depth (DiD) concept and the Probabilistic Safety Assessment (PSA) approach for the optimization of the safety performances of the nuclear installation. It proposes a conceptual framework and related process for the assessment of the 'safety architecture' implementing DiD, which is articulated in four main steps devoted to (1) the formulation of the safety objectives, (2) the identification of loads and environmental conditions, (3) the representation of the safety architecture and (4) the evaluation of the physical performance and reliability of the levels of DiD. A final additional step achieves the practical assessment of the safety architecture and the corresponding DiD with the support of the PSA. The comprehensive safety assessment of the implemented architecture needs its multi-dimensional representation, i.e. for given initiating event, sequence of possible failures, affected safety function and level of DiD. The risk space (frequency/probability of occurrence, versus consequences) is the framework for the integration between the DiD concept and the PSA approach. Additional qualitative key-notions are introduced in order to address the compliance of the safety architecture with a number of international safety requirements. In this context, the role of the PSA is no longer limited to the verification of the fulfilment of probabilistic targets but includes different contributions to the assessment of the DiD identified in this report. (authors)

  8. Security Strategies of Both Players in Asymmetric Information Zero-Sum Stochastic Games with an Informed Controller

    KAUST Repository

    Li, Lichun

    2017-11-07

    This paper considers a zero-sum two-player asymmetric information stochastic game where only one player knows the system state, and the transition law is controlled by the informed player only. For the informed player, it has been shown that the security strategy only depends on the belief and the current stage. We provide LP formulations whose size is only linear in the size of the uninformed player\\'s action set to compute both history based and belief based security strategies. For the uninformed player, we focus on the regret, the difference between 0 and the future payoff guaranteed by the uninformed player in every possible state. Regret is a real vector of the same size as the belief, and depends only on the action of the informed player and the strategy of the uninformed player. This paper shows that the uninformed player has a security strategy that only depends on the regret and the current stage. LP formulations are then given to compute the history based security strategy, the regret at every stage, and the regret based security strategy. The size of the LP formulations are again linear in the size of the uninformed player action set. Finally, an intrusion detection problem is studied to demonstrate the main results in this paper.

  9. Strategies for Human Capacity Development in Nuclear Safety and Security in the NNRA

    International Nuclear Information System (INIS)

    Akpanowo, M.; Iwuala, E.

    2016-01-01

    Full text: The Nigerian Nuclear Regulatory Authority (NNRA) is charged with the responsibility for nuclear safety and radiological protection regulation. With Nigeria as one of the nuclear power states, NNRA has since 2010 intensified efforts in developing capacity to license the first set of nuclear power plants in Nigeria. The NNRA has employed several strategies in developing building and strengthening the human capacity to fulfill its statutory functions. This paper describes available human capacity development programmes and the strategies for implementing them including, knowledge retention and management strategy. The strategy commences with the recruitment process, initial training and education and continuous training. As a technical support arm of the NNRA, the National Institute for Radiation Protection and Research offers postgraduate diploma and masters programmes in radiation protection, where many NNRA officers have been trained. The NNRA also leverages on its collaboration with different international organizations for the training of its manpower in the area of nuclear safety and security. NNRA Officers participate in various IAEA organized programmes including fellowship for postgraduate diploma and master programmes, training course, workshops, seminars, conferences, scientific visits and on-the-job-training (OJT). Collaborations with other international organizations are also presented. (author

  10. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  11. Probing strategy-project alignment: The case of the South African Social Security Agency

    Directory of Open Access Journals (Sweden)

    Gerrit Van Der Waldt

    2016-12-01

    Full Text Available Public institutions, such as the South African Social Security Agency (SASSA increasingly function in multi-project environments to translate strategies successfully into service-delivery initiatives. However, this ‘projectification’ often causes projects to be designed and executed haphazardly. This can lead to budget and schedule overruns, and the general wastage of an organisation’s resources. Project failures often occur where organisations do not ensure that specific projects are aligned with their core strategies. The purpose of this article is to combine the theories and principles of organisation, management, strategic management, and project management in an effort to pinpoint core determinants that can help establish the extent to which an organisation manages the alignment of its strategic projects. In the present study, the author applied the principles of interdisciplinarity, systems thinking, and organisational integration. The combined core determinants that were uncovered were then used in an empirical investigation of SASSA. The purpose of this investigation is to identify particular challenges the organisation faces in aligning their strategies and projects successfully. Thereafter, a number of recommendations follow to address these challenges.

  12. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Directory of Open Access Journals (Sweden)

    Audrey Guinchard

    2011-01-01

    Full Text Available Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.

  13. Green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  14. Green paper - towards a European strategy for the security of energy supply, technical document

    International Nuclear Information System (INIS)

    2005-01-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  15. The green paper 'towards a European strategy for the security of energy supply'

    International Nuclear Information System (INIS)

    Laponche, B.; Tillerson, K.

    2001-01-01

    The Green Paper, 'Towards a European Strategy for the Security of Energy Supply' was adopted by the European Commission on the 20. of November, 2000 (COM(2000)769 final). At this occasion, the Commission launched a public debate on this strategic document. On the 21. of June 2001, a Public Hearing on Security of energy supply in Europe, on the basis of the Green Paper, was organised by the Committee on Industry, External Trade, Research and Energy of the European Parliament. Bernard Laponche was among the six experts participating to the Hearing and presented the following paper, prepared with Kenya Tillerson. This presentation is organised in three chapters: I - Comments on the Green Paper; II - Energy efficiency potentials; III - Conclusions and Recommendations. Chapter I shows that under the heading of the security of supply, the Green paper elaborates and proposes a global energy strategy taking into account environmental and internal market issues and constraints. This leads to recommendations for a common energy policy for Europe based, as first priority, on a demand policy, i.e. energy efficiency on the demand side. If the necessity of such a policy is clearly stated, the Green paper remains weak on the quantitative objectives, due to the lack of contrasted energy forecast scenarios, as well as on the means of a vigorous energy efficiency policy at European Level. The issue of energy efficiency potentials at European Union level is examined in Chapter II, in the light of the poor information which can be extracted from the energy scenarios presented by the European Commission in various publications. A comparison of energy consumption indicators in France and the European Union leads to a rough estimate of a potential for energy demand efficiency by 2020 of the order of 280 Mtoe on final energy consumption, for the European Union. Chapter III underlines the merits of the Green Paper which are a clear-sighted analysis and a well defined main recommendation

  16. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  17. A National Security Strategy for a New Century: A Blueprint for Indiscriminate and Ineffectual Meddling in the Political Affairs of Other Nations

    National Research Council Canada - National Science Library

    1997-01-01

    The Clinton Administration's May 1997 monograph A National Security Strategy for a New Century was clearly the product of a committee A good strategy should be broad and inclusive and should reflect...

  18. Indigenous food security revival strategies at the village level: The gender factor implications

    Directory of Open Access Journals (Sweden)

    Wilfred Lunga

    2016-01-01

    Full Text Available This article is based on an evaluation concerning the practice of the Zunde raMambo concept (commonly referred to as Zunde in four of Zimbabwe’s 52 districts; (Mangwe, Lupane, Guruve and Hwedza. Zunde is a social security system providing protection against food shortages to vulnerable families and is coordinated by chiefs. The Zunde concept identifies with Ndebele and Shona rural communities in Zimbabwe. Thus, this evaluation sought to determine the relevance and fulfilment of the Zunde project objectives, namely: efficiency, effectiveness, impact and sustainability. The revived Zunde practice extends a long way in reducing food insecurity in vulnerable communities. Although the concept may be as old as the Zimbabwean culture, it had been abandoned as communities became urbanised. The Chief’s Council of Zimbabwe, in collaboration with the Nutrition Unit of the Ministry of Health and Child Welfare have rekindled it. However, to revive this indigenous knowledge practice, there is need to assess the nature of existing social and economic structures, leadership, gender roles and the availability of resources such as land, inputs and implements. This article, which is based on both qualitative and quantitative data, collected between September 2013 and March 2014, goes on to reflect on policy issues surrounding disaster risk reduction (DRR and survival strategies used by vulnerable communities in rural areas of Zimbabwe. It recommends that the gender factor approach offers the best means possible to understand peoples’ needs and challenges as well as how these can be satisfied and resolved respectively.

  19. The strategy for the development of information society in Serbia by 2020: Information security and critical infrastructure

    Directory of Open Access Journals (Sweden)

    Danijela D. Protić

    2012-10-01

    Full Text Available The development of technology has changed the world economy and induced new political trends. The European Union (EU and many non-EU member states apply the strategies of information society development that raise the level of information security (IS. The Serbian Government (Government has adopted the Strategy for Information Society in Serbia by 2020 (Strategy, and pointed to the challenges for the development of a modern Serbian information society. This paper presents an overview of the open-ended questions about IS, critical infrastructures and protection of critical infrastructures. Based on publicly available data, some critical national infrastructures are listed. As a possible solution to the problem of IS, the Public Key Infrastructure (PKI-based Information security integrated information system (ISIIS is presented. The ISIIS provides modularity and interoperability of critical infrastructures both in Serbia and neighboring countries.

  20. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  1. Green paper. Towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  2. Green paper. Towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-01-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  3. Ancient Clam Gardens Increased Shellfish Production: Adaptive Strategies from the Past Can Inform Food Security Today

    Science.gov (United States)

    Groesbeck, Amy S.; Rowell, Kirsten; Lepofsky, Dana; Salomon, Anne K.

    2014-01-01

    Maintaining food production while sustaining productive ecosystems is among the central challenges of our time, yet, it has been for millennia. Ancient clam gardens, intertidal rock-walled terraces constructed by humans during the late Holocene, are thought to have improved the growing conditions for clams. We tested this hypothesis by comparing the beach slope, intertidal height, and biomass and density of bivalves at replicate clam garden and non-walled clam beaches in British Columbia, Canada. We also quantified the variation in growth and survival rates of littleneck clams (Leukoma staminea) we experimentally transplanted across these two beach types. We found that clam gardens had significantly shallower slopes than non-walled beaches and greater densities of L. staminea and Saxidomus giganteus, particularly at smaller size classes. Overall, clam gardens contained 4 times as many butter clams and over twice as many littleneck clams relative to non-walled beaches. As predicted, this relationship varied as a function of intertidal height, whereby clam density and biomass tended to be greater in clam gardens compared to non-walled beaches at relatively higher intertidal heights. Transplanted juvenile L. staminea grew 1.7 times faster and smaller size classes were more likely to survive in clam gardens than non-walled beaches, specifically at the top and bottom of beaches. Consequently, we provide strong evidence that ancient clam gardens likely increased clam productivity by altering the slope of soft-sediment beaches, expanding optimal intertidal clam habitat, thereby enhancing growing conditions for clams. These results reveal how ancient shellfish aquaculture practices may have supported food security strategies in the past and provide insight into tools for the conservation, management, and governance of intertidal seascapes today. PMID:24618748

  4. Strategies to enable the adoption of animal biotechnology to sustainably improve global food safety and security.

    Science.gov (United States)

    Tizard, Mark; Hallerman, Eric; Fahrenkrug, Scott; Newell-McGloughlin, Martina; Gibson, John; de Loos, Frans; Wagner, Stefan; Laible, Götz; Han, Jae Yong; D'Occhio, Michael; Kelly, Lisa; Lowenthal, John; Gobius, Kari; Silva, Primal; Cooper, Caitlin; Doran, Tim

    2016-10-01

    The ability to generate transgenic animals has existed for over 30 years, and from those early days many predicted that the technology would have beneficial applications in agriculture. Numerous transgenic agricultural animals now exist, however to date only one product from a transgenic animal has been approved for the food chain, due in part to cumbersome regulations. Recently, new techniques such as precision breeding have emerged, which enables the introduction of desired traits without the use of transgenes. The rapidly growing human population, environmental degradation, and concerns related to zoonotic and pandemic diseases have increased pressure on the animal agriculture sector to provide a safe, secure and sustainable food supply. There is a clear need to adopt transgenic technologies as well as new methods such as gene editing and precision breeding to meet these challenges and the rising demand for animal products. To achieve this goal, cooperation, education, and communication between multiple stakeholders-including scientists, industry, farmers, governments, trade organizations, NGOs and the public-is necessary. This report is the culmination of concepts first discussed at an OECD sponsored conference and aims to identify the main barriers to the adoption of animal biotechnology, tactics for navigating those barriers, strategies to improve public perception and trust, as well as industry engagement, and actions for governments and trade organizations including the OECD to harmonize regulations and trade agreements. Specifically, the report focuses on animal biotechnologies that are intended to improve breeding and genetics and currently are not routinely used in commercial animal agriculture. We put forward recommendations on how scientists, regulators, and trade organizations can work together to ensure that the potential benefits of animal biotechnology can be realized to meet the future needs of agriculture to feed the world.

  5. an analysis of yam storage strategy to promote food security in asa

    African Journals Online (AJOL)

    Osondu

    2012-10-17

    Oct 17, 2012 ... with information regarding improved storage strategies as well as exposed to training on their use. .... be need to improve or develop new storage strategy. It is ... i. determine the various methods of yam storage strategy.

  6. Infrastructure to support trading strategies against the occurrence of extraordinary events: Secure area of the equipment storage

    International Nuclear Information System (INIS)

    Blas Gordo, A. de; Asensio Vega, J.; Fernandez Morales, E. J.; Font Hadinger, I.

    2013-01-01

    Compliance with the requirements specified in the Technical Instructions ITC and ITC-1-2, issued by the Nuclear Safety Council (CSN), is conducting exhaustive analyzes on coping in Nuclear Power Plants emergencies due to the occurrence extraordinary events. As part of the necessary infrastructure, a secure area for parking and storage of projects teams involved in the development of various operational strategies. The design of it ensures compliance with all regulatory and practical requirements, ensuring minimization strategies and time functionality in the application of the same.

  7. Engagement and Implications for Future National Security Strategies: Can the Services Adapt

    National Research Council Canada - National Science Library

    Hodge, Michael

    2000-01-01

    ...: mission profiles beyond the design of US armed forces, debate over the role of US armed forces within an "engagement" construct, debate over the future nature of US Security Policy and doctrinal...

  8. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  9. The Interagency Breakdown: Why We Need Legislative Reform to Coordinate Execution of the National Security Strategy

    National Research Council Canada - National Science Library

    Borkowski, David C

    2008-01-01

    To meet the national security demands of the 21st century, the U.S. Government's interagency structure and process require legislative reform equivalent to an interagency Goldwater-Nichols Act. The U.S...

  10. Reassessing U.S. National Security Strategy: The Kurdistan Worker's Party (PKK)

    National Research Council Canada - National Science Library

    Clark, Perry

    2008-01-01

    The Kurdistan Worker's Party (PKK), a terrorist-insurgent group with ties to lucrative transnational criminal organizations throughout Europe, continues to threaten Turkey-Iraq regional stability by attacking Turkish Security Forces...

  11. National Plan to Achieve Maritime Domain Awareness for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2005-01-01

    Maritime Domain Awareness (MDA) is the effective understanding of anything associated with the global maritime domain that could impact the security, safety, economy, or environment of the United States...

  12. THE FRAMEWORK STRATEGY RELATED TO SECURITY IN SOUTH-EASTERN EUROPE

    Directory of Open Access Journals (Sweden)

    Valentin-Bogdan DĂNILĂ

    2012-06-01

    Full Text Available When discussing the current strategic environment, there is the "when" of the Cold War and the first half of the '90s, and the "now" of today. The changing demography and migration patterns, ethnic and religious tensions, environmental degradation, instability coming from states that are likely to decline or have already fallen, and growing proliferation of weapons are just some of the problems that have exacerbated the differences between security "then" and "now", such as the transnational terrorist attacks after September 11, 2001. The concept of security was much disputed, as seen from a study of the United Nations in 1986, developed by a group of experts on the concept of security, resulting in the existence of a limited conceptual similarity between them Mankind has always been concerned with building or rebuilding peace and security During the Cold War, Central and Eastern European countries were not talking about a national security concept in the Western sense of the word, but about a military doctrine of the Warsaw Pact and, in some cases, as was that of Romania, about a national military doctrine. After the fall of the Iron Curtain, those countries have gradually chosen to use the concept of national security, a term that takes into account all types of threats to national interests, and also the whole range of ways to counter them, the military not having the leading role any longer.

  13. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    CERN Document Server

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  14. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.

    Science.gov (United States)

    Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

  15. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Hoon Ko

    2018-01-01

    Full Text Available Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

  16. Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Jirattigalachote, Amornrat

    2012-07-01

    The continuous growth of traffic demand driven by the brisk increase in number of Internet users and emerging online services creates new challenges for communication networks. The latest advances in Wavelength Division Multiplexing (WDM) technology make it possible to build Transparent Optical Networks (TONs) which are expected to be able to satisfy this rapidly growing capacity demand. The work in this thesis addresses three important aspects. In particular, this thesis focuses on routing and wavelength assignment (RWA) strategies specifically devised to target: (i) the lightpath transmission quality, (ii) the network security (i.e., in terms of vulnerability to physical-layer attacks), and (iii) the reduction of the network energy consumption. Our contributions are summarized below. A number of Impairment Constraint Based Routing (ICBR) algorithms have been proposed in the literature to consider physical-layer impairments during the connection provisioning phase. Their objective is to prevent the selection of optical connections (referred to as lightpaths) with poor signal quality. These ICBR approaches always assign each connection request the least impaired lightpath and support only a single threshold of transmission quality, used for all connection requests. However, next generation networks are expected to support a variety of services with disparate requirements for transmission quality. To address this issue, in this thesis we propose an ICBR algorithm supporting differentiation of services at the Bit Error Rate (BER) level, referred to as ICBR-Diff. Our approach takes into account the effect of physical-layer impairments during the connection provisioning phase where various BER thresholds are considered for accepting/blocking connection requests, depending on the signal quality requirements of the connection requests. We tested the proposed ICBR-Diff approach in different network scenarios, including also a fiber heterogeneity. It is shown that it can

  17. Security Games with Probabilistic Constraints on the Agent’s Strategy

    NARCIS (Netherlands)

    Laan, C.M.; Barros, A.I.; Boucherie, R.J.; Monsuur, H.

    2017-01-01

    This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such

  18. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    economic value, and allow entrepreneurs and industry to share facilities, equipment, and production capacity? In some cases, efforts similar to the Army...means to build community relations, maintain employee morale , and impact broad STEM education and national security STEM workforce efforts...acquisition and intellectual property create opportunities for U.S. entrepreneurs and companies while furthering the mission of the enterprise. Non

  19. Domestic water and sanitation as water security: monitoring, concepts and strategy

    Science.gov (United States)

    Bradley, David J.; Bartram, Jamie K.

    2013-01-01

    Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628

  20. Making Twenty-First-Century Strategy. An Introduction to Modern National Security Processes and Problems

    Science.gov (United States)

    2006-11-01

    of the same Greek root word connotes “great importance” or the “highest level.” In the resulting confusion, which continues to this day even among...battlefield strategy may puzzle some readers. We chose to use battlefield strategy to emphasize the connection between decisions made in the marble -lined

  1. Determining proper strategies for health, safety, security and environmental (HSSE) management system.

    Science.gov (United States)

    Zaeimdar, Mojgan; Nasiri, Parvin; Taghdisi, Mohammadhoseyn; Abbaspour, Majid; Arjmandi, Reza; Kalatipor, Omid

    2013-01-01

    Today, managing an organization is concerned with many problems. Adopting proper strategies can promote an organization's survival. This study aimed at developing an appropriate HSSE Strategy for regional operation associated companies of Iran National Gas Company (INGS) using SWOT analysis. The analysis of the strengths, weaknesses, opportunities, and threats of HSSE was carried out and according to the results suitable strategies were recommended. In this regard, senior and junior managers, supervisors, and experts active in regional operation associated companies of Iran National Gas Company participated in SWOT analysis from HSSE angle. Then, they selected the most applicable SWOT factors pertaining to the organization. In the next step, these factors were weighted and scored. Based on the results four categories of strategies were developed including SO, WO, ST, and WT. Further examination showed that SO Strategies were the most applicable for the organization.

  2. Energy Security and Economics of Indian Biofuel Strategy in a Global Context

    OpenAIRE

    Gunatilake, Herath; Roland-Holst, David; Sugiyarto, Guntur; Baka, Jenn

    2011-01-01

    The emergence of biofuel as a renewable energy source offers opportunities for climate change mitigation and greater energy security for many countries. At the same time, biofuel represents the possibility of substitution between energy and food. For developing countries like India, which imports over 75% of its crude oil, fossil fuels pose two risks - global warming pollution and negative economic impacts of oil price hikes. This paper examines India's options for managing energy price risk ...

  3. A National Security Strategy for Sweden: Balancing Risks and Opportunities in the 21st Century

    Science.gov (United States)

    2010-04-01

    physics and chemistry. The Intergovernmental Panel on Climate Change (IPCC) links a higher concentration of greenhouse gases to an increase in atmospheric...Command and Staff College. International Security Studies: AY10 Coursebook . Montgomery, 2009. Air Command and Staff College. War Studies Course: AY10... Coursebook . Montgomery, 2009. Assadourian, Eric (Project Director at the World Watch Institute). Vital Signs 2007-2008; The Trends that are Shaping Our

  4. Incorporating Charging/Discharging Strategy of Electric Vehicles into Security-Constrained Optimal Power Flow to Support High Renewable Penetration

    Directory of Open Access Journals (Sweden)

    Kyungsung An

    2017-05-01

    Full Text Available This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs; EVs interact with the grid through grid-to-vehicle (G2V and vehicle-to-grid (V2G services to ensure reliable and cost-effective grid operation. This research provides a computational framework for this decision-making process. Charging and discharging strategies of EV aggregators are incorporated into a security-constrained optimal power flow (SCOPF problem such that overall energy cost is minimized and operation within acceptable reliability criteria is ensured. Particularly, this SCOPF problem has been formulated for Jeju Island in South Korea, in order to lower carbon emissions toward a zero-carbon island by, for example, integrating large-scale renewable energy and EVs. On top of conventional constraints on the generators and line flows, a unique constraint on the system inertia constant, interpreted as the minimum synchronous generation, is considered to ensure grid security at high renewable penetration. The available energy constraint of the participating EV associated with the state-of-charge (SOC of the battery and market price-responsive behavior of the EV aggregators are also explored. Case studies for the Jeju electric power system in 2030 under various operational scenarios demonstrate the effectiveness of the proposed method and improved operational flexibility via controllable EVs.

  5. MALAYSIA'S POST-9/11 SECURITY STRATEGY: WINNING "HEARTS AND MINDS" OR LEGITIMISING THE POLITICAL STATUS QUO?

    Directory of Open Access Journals (Sweden)

    Andrew Humphreys

    2010-01-01

    Full Text Available Since the Emergency, the Malaysian government has maintained a security policy which somewhat paradoxically combines the use ofcoercive, repressive legislation with a "hearts and minds" ideology.Following 9/11, I argue that the government has adapted this "heartsand minds" approach to the so-called War on Terror. The BarisanNasional governments of Mahathir Mohamad and Abdullah Badawi bothformulated ideological strategies designed to undermine the ideological strength of al-Qaeda and establish Malaysia as a leader of the Muslim world. Mahathir and Abdullah hinged their ideological approach on a state-constructed form of Islam and sought to portray Malaysia as a tolerant and moderate Muslim country. However, it will be shown that the use of ideology in Malaysia is often calibrated to ensure regime security rather than national security. The Malaysian government has used its ideology to promote elite interests and limit the discursive space for alternative and opposing viewpoints. Significantly, ideology has been used to justify crackdowns against genuine political opponents and to legitimise the political status quo.

  6. Socio-Hydrological Observatory for Water Security (SHOWS): Examples of Adaptation Strategies With Next Challenges from Brazilian Risk Areas

    Science.gov (United States)

    Souza, F. A. A. D.; Mendiondo, E. M.; Taffarello, D.; Guzmán-Arias, D.; Fava, M. C.; Abreu, F.; Freitas, C. C.; de Macedo, M. B.; Estrada, C. R.; do Lago, C. A.

    2017-12-01

    In Brazil, more than 40,000 hot-spot areas, with vulnerable human settlements with ca. 120 million inhabitants and responsible of 60% of Brazilian Gross Net Product, are threatened by hydrological-driven disaster risks. In these areas, local resilient actions and adaptation strategies do integrate the current Brazilian Act and Regulation of Laws of urban waters, climate change and civil protection. However, these initiatives are still under slow progress, especially to cope with floods, landslides, droughts, progressive biodiversity losses and energy burnouts. Here we address these hot-spots through the concept of Socio-Hydrological Observatory for Water Security (SHOWS), with a mix of adaptation strategies, open-source, big data analysis and societal feedbacks. On the one hand, SHOWS merges strategies like the dynamic framework of water security (Srinivasan et al, 2017), drought risk mapping (Rossato et al, 2017) and water securitization under varying water demand and climate change until year 2100 (Mohor & Mendiondo, 2017; Guzmán-Arias et al, 2017). SHOWS acknowledges different perspectives of water insecurity, several spatiotemporal scales and regime shifts in socio-hydrologic systems. On the one hand, SHOWS links field monitoring during water insecurity hazards (Taffarello et al, 2016), ecosystem-based adaptation networks, and decision-making and big data sources to disaster management (Horita et al, 2017). By using selected examples from two Brazilian running interdisciplinary research aliances, i.e. CAPES-ProAlertas CEMADEN-CEPED/USP and the CNPq/FAPESP National Institute of Science & Technology on Climate Change-II Water Security, we also face the limits, the pros and cons of SHOWS' assumptions. Through real-cases paradoxes, (i.e. 2013/2014 drought), water dashboards and coevolution trends (i.e. impacts on river basin committees from scenarios until 2050, 2100 in NE & SE Brazil), SHOWS helps on guiding decisionmaking for next societal steps of water

  7. an analysis of yam storage strategy to promote food security in asa

    African Journals Online (AJOL)

    Osondu

    2012-10-17

    Oct 17, 2012 ... plant materials (27.3%) were the common storage strategy used which are not capable of ensuring good storage for ... faced in marketing yam produce. .... characteristics. Frequency. Percentage. Gender. Male. Female. 80. 30.

  8. National Security Strategy and the Munitions' Paradox: Self-Sufficiency or Maximum Efficiency

    National Research Council Canada - National Science Library

    McChesney, Michael

    1998-01-01

    ... that the United States military strategy may not be credible to likely regional aggressors. Conversely, DoD acquisition leadership believes industry consolidation should continue and the munitions base should be expanded to include US allies...

  9. Army Transformation: Its Long-Term Ability to Support the National Security Strategy

    National Research Council Canada - National Science Library

    Limberg, Daniel

    2006-01-01

    ..., interconnected and risky than ever before". The Cold War containment strategy is no longer effective in an environment of rogue nations, strong nationalistic sentiments, international criminal and terrorist organizations, and the proliferation...

  10. Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

    Directory of Open Access Journals (Sweden)

    Happy M. Tirivangasi

    2018-05-01

    Full Text Available Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities. Consequently, this has an impact on market access, trade, food supply, reduced income, increased food prices, decreased farm income and employment. Natural disasters create poverty, which in turn increases the prevalence of food insecurity and malnutrition. It is clear that disasters put food security at risk. The poorest people in the community are affected by food insecurity and disasters; hence, there is a need to be prepared as well as be in a position to manage disasters. Without serious efforts to address them, the risks of disasters will become an increasingly serious obstacle to sustainable development and the achievement of sustainable development goals, particularly goal number 2 ‘end hunger, achieve food security and improved nutrition and promote sustainable agriculture’. In recent years, countries in southern Africa have experienced an increase in the frequency, magnitude and impact of climate change–related hazards such as droughts, veld fire, depleting water resources and flood events. This research aims to reveal Southern African Development Community disaster risk management strategies for food security to see how they an influence and shape policy at the national level in southern Africa. Sustainable Livelihood approach was adopted as the main theoretical framework for the study. The qualitative Analysis is based largely on data from databases such as national reports, regional reports and empirical findings on the disaster management–sustainable development nexus.

  11. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.

    Science.gov (United States)

    1992-06-01

    Affairs Staffs Group General Motors Corporation Detroit, Michigan Director JOHN H. GIBBONS The Technology Assessment Board approves the release...Chairman & CEO Technology, Strategies & Alliances Donald W Putnam Corporate Director of Contracts General Dynamics Corp. Jack Ruina Professor of...parts. This strategy allowed Mazda to bring a new product to market quickly and make a profit despite low volume sales. (Peter F. Drucker, "The Big Three

  12. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    OpenAIRE

    Audrey Guinchard

    2011-01-01

    Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing ant...

  13. Russian gas export strategy and security of supply concerns in Europe

    International Nuclear Information System (INIS)

    Stern, J.P.

    1992-01-01

    Despite great publicity given to security of supply problems associated with Russian gas exports to Europe, these problems seem to be manageable. While the risk of short term technical breakdown exists, we are more likely to see a significant increase in Russian gas exports to Europe, than a significant fall. Increases could be achieved in the short term by moving more gas through the existing infrastructure. The restructuring of sales and transit relationships between Russia and other former Soviet republics (especially the Ukraine) as well as former CMEA member states in Central/Eastern Europe will be very important if export relationships are to be maintained and expanded. 7 refs., 1 tab

  14. Green paper: towards a European strategy for the security of energy supply; Livre Vert: vers une strategie europeenne de securite d'approvisionnement energetique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  15. Evaluating U.S. and Chinese Cyber Security Strategies Within a Cultural Framework

    Science.gov (United States)

    2016-04-01

    analysis of Chinese culture in warfare studies. They find that Chinese convention “respects inaction”28 and the teachings of Sun Tzu , thus favoring the...15 Bibliography ...AY16 16 Bibliography Ehsan Ahrari. “Transformation of America’s Military and Asymmetric War.” Comparative Strategy 29, no. 3 (2010): 223-244

  16. Agricultural diversification as an important strategy for achieving food security in Africa.

    Science.gov (United States)

    Waha, Katharina; van Wijk, Mark T; Fritz, Steffen; See, Linda; Thornton, Philip K; Wichern, Jannike; Herrero, Mario

    2018-03-31

    Farmers in Africa have long adapted to climatic and other risks by diversifying their farming activities. Using a multi-scale approach, we explore the relationship between farming diversity and food security and the diversification potential of African agriculture and its limits on the household and continental scale. On the household scale, we use agricultural surveys from more than 28,000 households located in 18 African countries. In a next step, we use the relationship between rainfall, rainfall variability, and farming diversity to determine the available diversification options for farmers on the continental scale. On the household scale, we show that households with greater farming diversity are more successful in meeting their consumption needs, but only up to a certain level of diversity per ha cropland and more often if food can be purchased from off-farm income or income from farm sales. More diverse farming systems can contribute to household food security; however, the relationship is influenced by other factors, for example, the market orientation of a household, livestock ownership, nonagricultural employment opportunities, and available land resources. On the continental scale, the greatest opportunities for diversification of food crops, cash crops, and livestock are located in areas with 500-1,000 mm annual rainfall and 17%-22% rainfall variability. Forty-three percent of the African cropland lacks these opportunities at present which may hamper the ability of agricultural systems to respond to climate change. While sustainable intensification practices that increase yields have received most attention to date, our study suggests that a shift in the research and policy paradigm toward agricultural diversification options may be necessary. © 2018 The Authors Global Change Biology Published by John Wiley & Sons Ltd.

  17. International Food Assistance: A U.S. Governmentwide Strategy Could Accelerate Progress Toward Global Food Security

    Science.gov (United States)

    2009-10-29

    Presidential Initiative to End Hunger in Africa ( IEHA )—which represented the U.S. strategy to help fulfill the MDG goal of halving hunger by 2015...was constrained in funding and limited in scope. In 2005, USAID, the primary agency that implemented IEHA , committed to providing an estimated $200...Development Assistance (DA) and other accounts. IEHA was intended to build an African-led partnership to cut hunger and poverty by investing in efforts

  18. Strategy of National Cultural Security and Modern Russia «Soft Force»

    Directory of Open Access Journals (Sweden)

    G J Filimonov

    2010-09-01

    Full Text Available Today one of the key factors needed for preservation of the state sovereignty, territorial integrity of the country, consolidation of a society, creation of conditions for the successful decision of internal problems and accordingly occurrence of possibility for conducting by the state of active foreign policy necessity of formation of own strategy of maintenance of national cultural safety and potentials so-called «soft force» appears.

  19. Analysis of household food security concerns and coping strategies of small farmers in northwestern highlands of pakistan

    International Nuclear Information System (INIS)

    Amir, R.M.; Shahbaz, B.; Ali, T.; Zafar, M.I.

    2013-01-01

    Food insecurity is turning out to be one of the worst crises of world in future. Developing countries are especially considered vulnerable to be hit most severely by this impending danger. Resource scarce regions of Pakistan are also included in the list of marginalized areas where population is not able to manage its food by herself. The present study was designed to analyze the state of household food security concerns and identify managing strategies for dealing with shortage of food patterns in Northern Pakistan. The research was based upon a survey of randomly selected two districts. Both qualitative and quantitative research methods were used for data collection. The results indicated that prices of food items were very high. It also delineated that lack of irrigational water; limited market access, and high cost of fertilizers were leading production related constraints. As a resort to these constraints and due to low output from the food crops there was found a shift from subsistence to cash seeking cropping patterns of the growers. This increase in income was perceived as a mean to ensure household food security. Furthermore, at household level the respondents expressed to reduce their expenses on the agricultural inputs in future. (author)

  20. Preliminary Strategic Environmental Assessment of the Great Western Development Strategy: Safeguarding Ecological Security for a New Western China

    Science.gov (United States)

    Li, Wei; Liu, Yan-Ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  1. Soil erosion, climate change and global food security: challenges and strategies.

    Science.gov (United States)

    Rhodes, Christopher J

    2014-01-01

    An overview is presented of the determined degree of global land degradation (principally occurring through soil erosion), with some consideration of its possible impact on global food security. Most determinations of the extent of land degradation (e.g. GLASOD) have been made on the basis of "expert judgement" and perceptions, as opposed to direct measurements of this multifactorial phenomenon. More recently, remote sensing measurements have been made which indicate that while some regions of the Earth are "browning" others are "greening". The latter effect is thought to be due to fertilisation of the growth of biomass by increasing levels of atmospheric CO2, and indeed the total amount of global biomass was observed to increase by 3.8% during the years 1981-2003. Nonetheless, 24% of the Earth's surface had occasioned some degree of degradation in the same time period. It appears that while long-term trends in NDVI (normalised difference vegetation index) derivatives are only broad indicators of land degradation, taken as a proxy, the NDVI/NPP (net primary productivity) trend is able to yield a benchmark that is globally consistent and to illuminate regions in which biologically significant changes are occurring. Thus, attention may be directed to where investigation and action at the ground level is required, i.e. to potential "hot spots" of land degradation and/or erosion. The severity of land degradation through soil erosion, and an according catastrophic threat to the survival of humanity may in part have been overstated, although the rising human population will impose inexorable demands for what the soil can provide. However the present system of industrialised agriculture would not be possible without plentiful provisions of cheap crude oil and natural gas to supply fuels, pesticides, herbicides and fertilisers. It is only on the basis of these inputs that it has been possible for the human population to rise above 7 billion. Hence, if the cheap oil and gas

  2. Spectroelectrochemistry as a Strategy for Improving Selectivity of Sensors for Security and Defense Applications

    Energy Technology Data Exchange (ETDEWEB)

    Heineman, William R.; Seliskar, Carl J.; Morris, Laura K.; Bryan, Samuel A.

    2012-12-19

    Spectroelectrochemistry provides improved selectivity for sensors by electrochemically modulating the optical signal associated with the analyte. The sensor consists of an optically transparent electrode (OTE) coated with a film that preconcentrates the target analyte. The OTE functions as an optical waveguide for attenuated total reflectance (ATR) spectroscopy, which detects the analyte by absorption. Alternatively, the OTE can serve as the excitation light for fluorescence detection, which is generally more sensitive than absorption. The analyte partitions into the film, undergoes an electrochemical redox reaction at the OTE surface, and absorbs or emits light in its oxidized or reduced state. The change in the optical response associated with electrochemical oxidation or reduction at the OTE is used to quantify the analyte. Absorption sensors for metal ion complexes such as [Fe(CN)6]4- and [Ru(bpy)3]2+ and fluorescence sensors for [Ru(bpy)3]2+ and the polycyclic aromatic hydrocarbon 1-hydroxypyrene have been developed. The sensor concept has been extended to binding assays for a protein using avidin–biotin and 17β-estradiol–anti-estradiol antibodies. The sensor has been demonstrated to measure metal complexes in complex samples such as nuclear waste and natural water. This sensor has qualities needed for security and defense applications that require a high level of selectivity and good detection limits for target analytes in complex samples. Quickly monitoring and designating intent of a nuclear program by measuring the Ru/Tc fission product ratio is such an application.

  3. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  4. Formulating Human Resources Development Strategies for Nuclear R and D, Safety and Security

    International Nuclear Information System (INIS)

    Min, B. J.; Kim, M. K.; Son, M. Y.

    2010-05-01

    Enforced by the recent launch of the 4th National Power Expansion Plan and the 1st Basic Plan for National Energy Policy with an ambitious goal of achieving 'Low CO2 Emission and Green Growth', a rapid expansion of nuclear technology development has been reemphasized. In addition, the nation, being a potential exporter of nuclear power plants and nuclear technologies strives to explore their exports markets. In response, it is inevitable to set the priority in human resource development (HRD) as nuclear technology development both requires and fosters HRD which in turn, enables to meet the successful implementation of nuclear power expansion. A continuous, consistent and well-managed programme of HRD is crucial to assure continuity over time in the needed capacities, skills and knowledge, and to establish and maintain a cadre of manpower variously trained in different nuclear-related skills and educated in nuclear relevant fields. The objective of the study is to conduct comprehensive quantitative analyses to estimate future human resources requirements, particularly in the field of nuclear R and D, safety and security in order to establish an appropriate long-term nuclear HRD plan

  5. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  6. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  7. Energy efficiency, security of supply and the environment in South Africa: Moving beyond the strategy documents

    International Nuclear Information System (INIS)

    Sebitosi, A.B.

    2008-01-01

    Energy efficiency is one of the most potent and cost effective ways of meeting the demands of sustainable development. It has in fact been referred to as the best energy resource. Way back in 2005 the South African Department of Minerals and Energy (DME) published its Energy Efficiency Strategy in support of some of the objectives enlisted in the 1998 White Paper on Energy Policy. The Strategy set a national target for energy efficiency improvement of 12% by 2015 against the baseline year 2000. The document further predicted that, with a business as usual model of energy usage, at the projected rate of national economic development, there would be a need to invest in new power generating capacity by around 2007. Despite the policy foresight and seemingly enthusiastic efforts, though, the dawn of 2008 saw the country gripped in an electric power crisis, with a capacity shortfall of over 10%. This paper looks at what could have gone wrong, examines energy efficiency policies and measures in other countries and how these lessons could be adopted to the South African context

  8. Energy efficiency, security of supply and the environment in South Africa: Moving beyond the strategy documents

    Energy Technology Data Exchange (ETDEWEB)

    Sebitosi, A.B. [Department of Electrical Engineering, University of Cape Town, Rondebosch 7701 (South Africa)

    2008-11-15

    Energy efficiency is one of the most potent and cost effective ways of meeting the demands of sustainable development. It has in fact been referred to as the best energy resource. Way back in 2005 the South African Department of Minerals and Energy (DME) published its Energy Efficiency Strategy in support of some of the objectives enlisted in the 1998 White Paper on Energy Policy. The Strategy set a national target for energy efficiency improvement of 12% by 2015 against the baseline year 2000. The document further predicted that, with a business as usual model of energy usage, at the projected rate of national economic development, there would be a need to invest in new power generating capacity by around 2007. Despite the policy foresight and seemingly enthusiastic efforts, though, the dawn of 2008 saw the country gripped in an electric power crisis, with a capacity shortfall of over 10%. This paper looks at what could have gone wrong, examines energy efficiency policies and measures in other countries and how these lessons could be adopted to the South African context. (author)

  9. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    International Nuclear Information System (INIS)

    2005-01-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  10. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  11. Safe, secure, and clean disposal of final nuclear wastes using 'PyroGreen' strategies

    International Nuclear Information System (INIS)

    Jung, HyoSook; Choi, Sungyeol; Hwang, Il Soon

    2011-01-01

    Spent nuclear fuels (SNFs) present global challenges that must be overcome to pave way for safe, secure, peaceful and clean nuclear energy. As one of innovative solutions, we have proposed an innovative partitioning, transmutation, and disposal approach named as 'PyroGreen' that is designed to eliminate the need for high-level waste repositories. A flowsheet of pyrochemical partitioning process with technically achievable values of decontamination factors on long-living radionuclides has been established to enable all the final wastes to be disposed of as low and intermediate level wastes. The long-term performance of a geological repository was assessed by SAFE-ROCK code for the final wastes from the PyroGreen processing of entire 26,000 MTHM of SNFs arising from lifetime operation of 24 pressurized water reactors. The assessment results agree well with an earlier study in the fact that most harmful radionuclides dominating groundwater migration risk are shown to be long-living fission products including C-14, Cl-36, Se-79, I-129, and Cs-135, whereas most actinides including U, Pu, Np, Am, and Cm are shown to remain near the repository. It is shown that the final wastes can meet the radiological dose limit of current Korean regulation on the low and intermediate level waste repository. Long-living actinide concentration in wastes is comparable with those in wastes in Waste Isolation Pilot Plant that has proved adequately low risk of human intrusion. Overall decontamination factors required for PyroGreen are finally determined as 20,000 for uranium and all transuranic elements whereas much lower values in the range of 10-50 are required for important fission products including Se, Tc, I, Sr, and Cs in order to eliminate the need for any high-level waste repository. It has been shown that experimentally demonstrated recovery rate data for key process steps positively support the feasibility of PyroGreen. SAFE-ROCK code was used to evaluate the long-term performance

  12. Use of decision trees for evaluating severe accident management strategies in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Jae, Moosung [Hanyang Univ., Seoul (Korea, Republic of). Dept. of Nuclerar Engineering; Lee, Yongjin; Jerng, Dong Wook [Chung-Ang Univ., Seoul (Korea, Republic of). School of Energy Systems Engineering

    2016-07-15

    Accident management strategies are defined to innovative actions taken by plant operators to prevent core damage or to maintain the sound containment integrity. Such actions minimize the chance of offsite radioactive substance leaks that lead to and intensify core damage under power plant accident conditions. Accident management extends the concept of Defense in Depth against core meltdown accidents. In pressurized water reactors, emergency operating procedures are performed to extend the core cooling time. The effectiveness of Severe Accident Management Guidance (SAMG) became an important issue. Severe accident management strategies are evaluated with a methodology utilizing the decision tree technique.

  13. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    Science.gov (United States)

    2010-12-01

    a fingerprint -based criminal history records check (CHRC) for individuals seeking unescorted access to secure areas of an airport (§ 1542.209...What needs to be reduced? • What needs to be created? 111 With this information answered, a strategy canvas was then created to convey the

  14. Opportunities for national repositories to resolve security challenges of past, present and future nuclear eras

    International Nuclear Information System (INIS)

    Sanders, T.L.

    2005-01-01

    With the global nuclear picture becoming even more complex, the role of repositories in accomplishing arms control, homeland security, and proliferation prevention goals has moved to front and center. Evolving repository infrastructures offer outstanding opportunities for illustrating advanced approaches for managing these risks. The traditional defense-in-depth concepts used to manage fuel cycle safety and protect nuclear materials in the U.S. and other countries could also be established as a framework for developing hardened, secure, and proliferation resistant material infrastructures including disposal systems. This analysis concept has been effective in establishing the safety basis for nuclear fuel cycles, reactors, and nuclear waste repositories. The concept results in the balanced use of multiple, diverse barriers to prevent the occurrence of undesired events such as radioactive releases from a safety perspective, or materials theft from a physical protection perspective. (author)

  15. Model-based Impact Assessment of an Integrated Water Management Strategy on Ecosystem Services relevant to Food Security in Namibia

    Science.gov (United States)

    Luetkemeier, R.; Liehr, S.

    2012-04-01

    North-central Namibia is characterized by seasonal alterations of drought and heavy rainfall, mostly saline groundwater resources and a lack of perennial rivers. Water scarcity poses a great challenge for freshwater supply, harvest and food security against the background of high population growth and climate change. CuveWaters project aims at poverty reduction and livelihood improvement on a long term basis by introducing a multi-resource-mix as part of an integrated water resources management (IWRM) approach. Herein, creating water buffers by rainwater harvesting (RWH) and subsurface water storage as well as reuse of treated wastewater facilitates micro-scale gardening activities. This link constitutes a major component of a sustainable adaptation strategy by contributing to the conservation and improvement of basic food and freshwater resources in order to reduce drought vulnerability. This paper presents main findings of an impact assessment carried out on the effect of integrated water resources management on ecosystem services (ESS) relevant to food security within the framework of CuveWaters project. North-central Namibia is perceived as a social-ecological system characterized by a strong mutual dependence between natural environment and anthropogenic system. This fundamental reliance on natural resources highlights the key role of ESS in semi-arid environments to sustain human livelihoods. Among other services, food provision was chosen for quantification as one of the most fundamental ESS in north-central Namibia. Different nutritional values were utilized as indicators to adopt a demand-supply approach (Ecosystem Service Profile) to illustrate the ability of the ecosystem to meet people's nutritional requirements. Calculations have been conducted using both Bayesian networks to incorporate uncertainty introduced by the variability of monthly precipitation and the application of plant specific water production functions. Results show that improving the

  16. Port Security Strategy 2012

    Science.gov (United States)

    2007-06-15

    the Australia Embassy in Indonesia, on 5 August 2003 at the Marriott Hotel in Indonesia, and on 19 April 1995 in Oklahoma City in the United States...devised to provide the routine, close-in surveillance to the activities on the Red lines – Outbound merchant vessel Yellow Line- Inbound merchant...were calculated from the generated data. A logistic linear regression model was fit to the data to help to interpret the meaning of the model output

  17. National Security Strategy

    Science.gov (United States)

    2015-02-01

    students globally every year. We continue to attract immigrants from every corner of the world who renew our country with their energy and...of our manufacturing revolution will create the next generation of high technology manufacturing jobs. Immigration reform that combines smart and...Mexico to enhance our collective economic competitiveness while advancing prosperity in our hemisphere. With Chile , Peru, Mexico, and Canada, we

  18. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  19. Study on Cyber-security Strategy and National Cyberspace Sovereignty%论网络安全战略与国家网络主权

    Institute of Scientific and Technical Information of China (English)

    邹鹏; 朱诗兵; 邹红霞

    2017-01-01

    While national interests increasingly extending with the development of cyberspace, cyberspace sovereignty and its guarantee have drawn wide attention from international communities and major countries have developed space-security strategy to safeguard their national cyberspace sovereignty.This paper analyzes the relationship between the cyberspace sovereignty and cyber-security as well as summarizes the characteristics of existing cyber-security strategies in the world.In view of protecting our national cyberspace sovereignty, it points out the issues we should pay more attention to in the formulation and implementation of cyber-security strategy which include taking national security as the starting point, taking cyberspace sovereignty as the fundament, perfecting relevant law and regulation systems, improving relevant systems, mechanisms and the support systems, accelerating the development of core technologies in cyber-security and strengthening the cyber-security training.%随着网络空间承载的国家利益日益广泛,网络主权及其保障问题引起了国际社会的高度重视,世界主要国家纷纷通过制定网络安全战略来维护本国网络主权.分析了世界各国对网络主权保护的态度及网络主权与网络安全的关系,综述了世界各国现有网络安全战略的特点.从保护我国国家网络主权的实际需求出发,指出了我国在网络安全战略的制定和实施中应当重点关注的问题,即以总体国家安全观为根本出发点、以网络主权为基本依据、健全相关法律法规体系、健全体制机制和保障力量体系、加快推进网络安全核心技术发展以及加强网络安全人才培养.

  20. US Strategy for Cyberspace

    National Research Council Canada - National Science Library

    Veazie, Arnold

    2003-01-01

    .... This strategic research paper analyzes the President's National Strategy to Secure Cyberspace to determine whether it effectively provides solutions for securing cyberspace. It concludes by proposing an alternative strategy for securing cyberspace.

  1. Scripting Quality of Security Service (QoSS) Safeguard Measures for the Suggested INFOCON System

    National Research Council Canada - National Science Library

    Guild, Jennifer

    2004-01-01

    .... The INFOCON system vaguely follows the Defense in Depth network defense methodology. This thesis examines the foundations for the existing INFOCON system and presents an evolved INFOCON system...

  2. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

  3. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

  4. From Islands to Networks: A Blueprint for a Comprehensive US Security Strategy in the Asia-Pacific Region

    National Research Council Canada - National Science Library

    Zastrow, Roderick

    2002-01-01

    ... US Asia-Pacific strategy of Assured Partnership would safely manage this dilemma by incorporating a multi-tiered, inclusive, institutional approach, The strategy will decrease the likelihood of a US...

  5. 一种分布式互联网彩票安全策略%A distributed security strategy for internet lottery

    Institute of Scientific and Technical Information of China (English)

    梅颖

    2017-01-01

    This paper proposes a distributed security strategy for internet lottery;it builds a distributed public ledger based on the blockchain technology to record all lottery transactions and provides the specific details of the strategy and the prototype architecture,analyzes the security characteristics of the strategy about anonymity,non-repudiation,tamper-resistant,transparency,which proves that the strategy can effectively solve the problems caused by the traditional centralization technology,that make operation is opaque,easy to be artificially controlled,lottery transactions in the entire process cannot be perceived by the user,so as to provide an effective solution for the construction of a secure internet lottery system.%提出了一种分布式互联网彩票安全策略,该策略基于区块链技术建立一个分布式公共账本,记录所有的彩票交易记录.详细阐述了该策略的具体细节和原型体系结构,并通过对该策略的匿名性、抗抵赖性、防篡改、透明性等安全特性进行分析,证明该策略能有效解决传统的基于中心化技术所导致运营不透明、容易被人为控制、彩票交易的整个流程中也不能被用户察觉等问题,为构建安全的互联网彩票系统提供有效的解决方案.

  6. Bibliography on the defense in depth (DiD) approach for nuclear safety

    International Nuclear Information System (INIS)

    Wielenberg, Andreas

    2016-07-01

    This report is a bibliography on references related to the concept of defence-in-depth (DiD), particularly in the field of nuclear reactor safety. In addition, selected publications on the application of DiD outside of the field of nuclear reactor safety are referenced. For each reference, the main data of the publication, an assignment of key words, a short summary of the relation to DiD and, if applicable, a link to an internet resource for the document is provided. The bibliography report aims at covering all the major sources of regulatory documents and texts related to DiD in nuclear reactor safety for major international organisation on nuclear reactor safety and regulators in the Europe, North America, and selected Asian countries. In order to manage the scope of the work, more recent publications have received precedence by the authors, outdated versions or superseded documents might not be included in this report. Since there are a lot of publications on the concept on DiD in a number of contexts, producing a comprehensive listing beyond the context of regulatory publications was not possible for this publication. There are, therefore, a lot of textbooks, publications in scientific journals, conference contributions, etc. related to the concept of DiD, which are not included into this report. Their omission is due to the constraints for the production of this report and is in no way intended as a negative statement on either their relevance or their technical quality. Publications after 2014 are not reflected in this report. (authors)

  7. Modeling Safety Barriers and Defense in Depth with Mulitlevel Flow Modeling

    DEFF Research Database (Denmark)

    Lind, Morten

    2012-01-01

    in MFM is a barrier function. It is shown that other barrier types can be represented andthat their combination into barrier chains may be used to analyze and design levels of safety in automated processes.Suggestion for further research on barrier modeling with MFM are included....

  8. Remotely Piloted Aerial Systems Survivability: A Defense-in-Depth Approach

    Science.gov (United States)

    2012-09-01

    The 2007 roadmap fails to account for the fact that survivability and interoperability cannot be divorced when dealing with a system of systems...School, Monterrey , CA, August 2004), http://www.nps.edu/Academics/Schools/GSEAS/Departments/SE/Documents/SE- Scholarship.doc, (accessed 13 December 2009...Statement on Systems Engineering Scholarship.” Naval Postgraduate School, Monterrey , CA, August 2004. http://www.nps.edu/Academics/Schools/GSEAS

  9. Improvements in Defense in Depth in French Nuclear Power Plants Following Fukushima Accidents

    Energy Technology Data Exchange (ETDEWEB)

    Barbaud, J. [EDF SEPTEN, Villeurbanne Cedex (France); Pouget-Abadie, X., E-mail: jean.barbaud@edf.fr [EDF DIN Headquarters, Saint-Denis (France)

    2014-10-15

    The accidents which occurred in the nuclear power plants in Fukushima-Daiichi resulted in a complementary safety assessment (CSA or stress-tests) of all French NPPs to confirm their compliance with their design bases and to evaluate their behaviour beyond it. They have shown that nuclear facilities have a satisfactory level of safety, but it had been decided to significantly improve their robustness to extreme situations, beyond the safety margins they have already. Planned improvements include several parts, where the main ones are the implementation of a hardened safety core (HSC) of key components for the management of extreme situations resulting from a hazard beyond the design and deployment of a nuclear rapid response force (FARN). The hardened safety core aims to avoid massive releases and lasting effects in the environment. It relies on existing or new components designed or verified to hazards with significant margins compared to the design levels of NPP beyond. It also includes provisions allowing crisis management, including crisis centre and communication means. The FARN complements the HSC and the crisis organization to bring from off-site sufficient human and material resources to increase the autonomy of the site. All these improvement contribute to a better defence in depth. (author)

  10. Climate Change and Water Security in South Africa; Assessing Conflict and Coping Strategies in KwaZulu-Natal

    Science.gov (United States)

    Hosea, P. O.

    2017-12-01

    The focus on the security implication of climate change was intensified after the 2007 United Nations Security Council debate on climate change as a threat multiplier. In the light of this, Africa is identified as the continent highly vulnerable to climate change impacts due to its high dependence on climate sensitive economy, high poverty prevalence rate, weak institutional coping capacity as well as poor social infrastructure. In the past decades, the peculiarity of South Africa vis-à-vis climate change vulnerability, especially water scarcity, has become an issue of political and economic concern. The country is water stressed due to its arid and semi-arid conditions. In light of this, the Council for Scientific and Industrial Research (CSIR) (2010) assert that while global temperature increased by 0.80C over the last century, the surface temperature around the Southern Africa region increased by 2.00C over the same period. This connotes that climate change and its impact is inevitable for the region. This will further exacerbate the already stress water resources within South Africa. Owing to Cilliers (2009) and the Council on Foreign Relations (2016) argument that most conflict in Africa are largely driven by resource competition which are masqueraded as issues based on politics, religion or ethnicity, this study investigates the propensity of conflict dynamics in relation to climate change and water security. Using eco-violence theory as a theoretical framework and on the premises of human security, the study assess the security implications triggered by the impact of climate change on water security of rural communities in uMkhanyakude District Municipality, KwaZulu-Natal, South Africa. It focused on the extent to which this might trigger conflict as a coping mechanism among rural dwellers to water insecurity in order to inform policy options. Data for the were sourced using a mixed method paradigm where 385 survey questionnaire were distributed using

  11. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  12. U.S. Army War College Guide to National Security Issues. Third Edition, Volume 1. Theory of War and Strategy

    Science.gov (United States)

    2008-06-01

    consideration of the unknowns and the role of chance, and recognizes the strategic environment consists of both physical and humanistic systems.19 It...or total goals. It really makes no difference if the goal is something existential like continuing to exist as a nation or something less vital...are less well adapted to confront the new threat structure emerging in an age of sacred terror and new kinds of existential concerns. The security

  13. The U.S. Army War College Guide to National Security Issues. Volume 1: Theory of War and Strategy

    Science.gov (United States)

    2010-07-01

    of both physical and humanistic systems.19 It is one thinking lens that has great application in the strategic appraisal process. Richard E. Neustadt...total goals. It really makes 85 no difference if the goal is something existential like continuing to exist as a nation or something less vital like...kinds of existential concerns. The security problem has become more complex and multidimensional. In his seminal People, States and War, first published

  14. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  15. Nuclear energy and the Green Paper of the European Commission 'An European strategy for sustainable, competitive and secure energy'

    International Nuclear Information System (INIS)

    Metes, Mircea

    2006-01-01

    At present the energy is for European Union officials an issue of top priority. In the beginning of 2006 the natural gas crisis between Russia and Ukraine remembered menacingly to the Europeans that energy supply of the continent depends decisively on importation from other geographic areas and that these importation raise risks of a great variety. In addition to the power problems, disastrous effects on the economy, human life and eco-systems appeared to have the climate changes produced by fossil fuel burning. Consequently, a common energetic policy of Europe should be targeted at three main objectives: sustainability, competitiveness and security of supply. Six directions of action were identified: 1. EU must finalize the construction of internal European gas and electricity market; 2. EU should ensure that its energy market guaranties the security of supply under a solidary policy of the member states; 3. It is necessary that a large debate to have place about different sources of energy including the problems of costs and impact on climatic change, security and supply competitiveness and sustainability; 4. EU should approach the climatic change issues in agreement with the objectives established at Lisbon conference aiming at placing EU in the forefront of technological and scientific progress; 5. A strategic plan concerning the energy technology; 6. A common foreign policy in the field of energy. It is worthy to stress that the present Green Paper of EU has a manifestly different position concerning the nuclear energy with respect to the prior Green Paper of November 2000. While, in 2000 the EU Commission viewed the nuclear energy as being 'in limbo', in the 2006 version the Commission declared the nuclear energy as the most important source of power in Europe without CO 2 emissions. It is stated that all the energy options should be kept open while the Europe states have the right to establish their own energy mix, which they consider optimal, and in which

  16. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    Energy Technology Data Exchange (ETDEWEB)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  17. The application of nuclear and national security safeguard strategies to the insider threat in the private sector

    International Nuclear Information System (INIS)

    Campbell, G.K.

    1991-01-01

    This paper reports that the insider threat in commercial enterprises represents multi-billion dollar losses on an annual basis. While much of this experience is in low value, theft-related shrinkage, there are a growing number of organizations where the loss or compromise of critical assets or interruption of vital systems cannot be tolerated. In very real ways, the survival of the organization may turn on the hostile acts of knowledgeable insiders. The nuclear and National security information operations environments represents a baseline of experience from which the corporate world can draw for cost-effective, alternative approaches to this threat. However, it is equally clear that there are a variety of subtle and obvious constraints imposed by the private sector's mission, service delivery, lifestyle and cost-benefit requirements which dictate careful planning and user involvement in safeguards development and application. Where protection of our National security assets are grounded in a consequence-driven set of policies and standards, the private sector is often subject to the lack of a similar (but directly analogous) policy foundation

  18. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.

  19. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  20. United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment?

    Science.gov (United States)

    2012-12-14

    Specific Federal Agencies Department of Agriculture Agriculture, Food ( meat , poultry , egg products) Sector-Specific Agencies shall...Healthcare, and food (other than meat , poultry , egg products) Environmental Protection Agency Drinking water and Water treatment systems...EOP entities, develop a framework for research and development strategies that focus on game -changing technologies that have the potential to enhance

  1. Case Study: Strategy for the Establishment of the Centre for Nuclear Safety and Security in South Africa

    International Nuclear Information System (INIS)

    Nhleko, S.; Tyobeka, B.M.

    2016-01-01

    Full text: The establishment of a dedicated nuclear safety centre as part of nuclear industry infrastructure is a common practice among nuclear countries that is also recognized and recommended by the International Atomic Energy Agency (see, for instance, IAEA GSR Part 1). However, South Africa currently does not have such a centre. This paper presents a strategy that has been developed for the establishment of a nuclear safety centre that will support the nuclear knowledge management infrastructure of the National Nuclear Regulator of South Africa. After a brief introduction, the challenges faced by the Regulator are presented. Next, the minimum requirements for addressing the challenges are summarized by providing an outline of strategic objectives to be fulfilled. This is followed by the description of the strategy developed to fulfil the objectives, including key programmes that will be implemented. A qualitative evaluation of benefits that will result from the implementation of the strategy is also presented. Additional provisions which are required in the national legislation to facilitate successful implementation of the strategy are highlighted based on lessons learned from other regulators. Finally, lessons learned during the execution of this project are summarized in order to provide guidelines for similar projects. (author

  2. The strategies to develop renewable energy application in the frame to secure energy need and electricity demand in Indonesia

    International Nuclear Information System (INIS)

    Suharta, Herliyani; Hoetman, A. R.; Sayigh, A. m.

    2006-01-01

    The paper describe the evaluation of conventional energy usage and electricity condition in Indonesia. Also there is discussion on 14 facts that will affect the security in providing the electricity and other house hold energy demand. Those covers a picture of the growth of energy demand, oil subsidy, limited and remaining natural resources, crude petroleum export and import projection, forecast of un-risk natural gas production, gas and coal for electric generation, declining of coal deposit. An effort and considerations to increase the use of renewable energy (RE) are also described. It covers a power plant selection to mach the RE resources to partly fulfill the electricity development planning, its electricity price and also the use of RE resources to fulfill the energy need in household.(Author)

  3. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Social networking-based simulations for nuclear security: Strategy assessment following nuclear cyber terror on South Korean nuclear power plants (NPPs)

    International Nuclear Information System (INIS)

    Woo, Tae Ho; Kwak, Sang Man

    2015-01-01

    Highlights: • The cyber terror modeling is made by the social networking algorithm. • This is applicable by the social networking service (SNS). • Security of nuclear industry could be controlled by the network theory. • Newly developed complex algorithm can be introduced. • Simplified graphics show the operator easily. - Abstract: Nuclear energy has been studied for the secure power productions, which is based on the simulation study following the incident of nuclear cyber terror attack on South Korean nuclear power plants (NPPs). The social networking is used for the terror incident modeling and its prevention strategies. The nuclear industry could be investigated in the aspect of minimizing the dangerous situations caused by possible terror attacks which are considered by the society oriented connectivity among the related people or groups. The social networking circle by system dynamics diagram (SNCSD) is constructed, where the configuration of a model social networking example by system dynamics (SD) is applied. From A to H regions, the values are obtained by the random numbers incorporated with the designed algorithms. The results show the comparative values of terror possibilities which are based on the proposed social networking algorithm. It is possible to prepare for potential terrorism in the nuclear industry

  6. Green paper - towards a European strategy for the security of energy supply, technical document; Livret vert sur la securite de l'approvisionnement en energie, document technique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  7. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  8. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  9. Review: Feed demand landscape and implications of food-not feed strategy for food security and climate change.

    Science.gov (United States)

    Makkar, H P S

    2017-12-04

    The food-feed competition is one of the complex challenges, and so are the ongoing climate change, land degradation and water shortage for realizing sustainable food production systems. By 2050 the global demand for animal products is projected to increase by 60% to 70%, and developing countries will have a lion's share in this increase. Currently, ~800 million tonnes of cereals (one-third of total cereal production) are used in animal feed and by 2050 it is projected to be over 1.1 billion tonnes. Most of the increase in feed demand will be in developing countries, which already face many food security challenges. Additional feed required for the projected increased demand of animal products, if met through food grains, will further exacerbate the food insecurity in these countries. Furthermore, globally, the production, processing and transport of feed account for 45% of the greenhouse gas emissions from the livestock sector. This paper presents approaches for addressing these challenges in quest for making livestock sector more sustainable. The use of novel human-inedible feed resources such as insect meals, leaf meals, protein isolates, single cell protein produced using waste streams, protein hydrolysates, spineless cactus, algae, co-products of the biofuel industry, food wastes among others, has enormous prospects. Efficient use of grasslands also offers possibilities for increasing carbon sequestration, land reclamation and livestock productivity. Opportunities also exist for decreasing feed wastages by simple and well proven practices such as use of appropriate troughs, increase in efficiency of harvesting crop residues and their conversion to complete feeds especially in the form of densified feed blocks or pellets, feeding as per the nutrient requirements, among others. Available evidence have been presented to substantiate arguments that: (a) for successful and sustained adoption of a feed technology, participation of the private sector and a sound

  10. Post-Closure Strategy for Use-Restricted Sites on the Nevada National Security Site, Nevada Test and Training Range, and Tonopah Test Range, Nevada

    International Nuclear Information System (INIS)

    Silvas, A. J.

    2014-01-01

    The purpose of this Post-Closure Strategy is to provide a consistent methodology for continual evaluation of post-closure requirements for use-restricted areas on the Nevada National Security Site (NNSS), Nevada Test and Training Range (NTTR), and Tonopah Test Range (TTR) to consolidate, modify, or streamline the program. In addition, this document stipulates the creation of a single consolidated Post-Closure Plan that will detail the current post-closure requirements for all active use restrictions (URs) and outlines its implementation and subsequent revision. This strategy will ensure effective management and control of the post-closure sites. There are currently over 200 URs located on the NNSS, NTTR, and TTR. Post-closure requirements were initially established in the Closure Report for each site. In some cases, changes to the post-closure requirements have been implemented through addenda, errata sheets, records of technical change, or letters. Post-closure requirements have been collected from these multiple sources and consolidated into several formats, such as summaries and databases. This structure increases the possibility of inconsistencies and uncertainty. As more URs are established and the post-closure program is expanded, the need for a comprehensive approach for managing the program will increase. Not only should the current requirements be obtainable from a single source that supersedes all previous requirements, but the strategy for modifying the requirements should be standardized. This will enable more effective management of the program into the future. This strategy document and the subsequent comprehensive plan are to be implemented under the assumption that the NNSS and outlying sites will be under the purview of the U.S. Department of Energy, National Nuclear Security Administration for the foreseeable future. This strategy was also developed assuming that regulatory control of the sites remains static. The comprehensive plan is not

  11. The IRSN's scientific strategy for the progress of nuclear safety, nuclear security and radiation protection

    International Nuclear Information System (INIS)

    2015-12-01

    This publication defines the new strategy of the IRSN to fulfil its role in nuclear safety, in the protection of mankind and of the environment against ionizing radiations, and in the protection of nuclear materials, installations and transports against malevolent acts. The IRSN is also involved in public information, and as an actor and a partner in the definition of other major public policies such as research and innovation, work health or environmental health. In a first part, the report highlights these missions, the current evolution of the international scientific, technological and economic context, and briefly evokes the major scientific challenges for the next decade. The second part highlights the abilities and capacities of the IRSN to support scientific approaches and works. The main orientations are then formulated and commented: to justify scientific orientation backgrounds and means to assign, to associate final recipients to research works, to implement initiatives to develop national, European and international cooperation in the field of nuclear and radiological risks, to develop academic partnerships and to participate to national research alliances, to develop collaboration with industries, nuclear operators and actors of the medical sector, to possess tools to perform numeric simulation, to guarantee the access for the Institute to research and experimentation infrastructures and data bases, to develop methodologies and tools for aid to decision, to perpetuate knowledge and know-how for a better renewal of risk assessment. The report then presents the main questions of interest regarding radiation protection and nuclear safety

  12. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  13. Defending Critical Infrastructure as Cyber Key Terrain

    Science.gov (United States)

    2016-08-01

    to Secure Cyberspace (NSSC) is as it lists three strategic objectives:4 1) Prevent cyber attacks against America’s critical infrastructures; 2...House, “National Strategy to Secure Cyberspace,” (Washington, DC: The White House, 2003) Trey Herr, "PrEP: A framework for malware & cyber weapons...David Kuipers and Mark Fabro. “Control Systems Cyber Security : Defense in Depth Strategies,” [United States: Department of Energy, 2006]: 4

  14. Infrastructures Development Strategy in Energy Engineering Education and Research: a Bonus to Introduce a Safe and Secure Nuclear Power Program

    Energy Technology Data Exchange (ETDEWEB)

    Bouhelal, Oum Keltoum [National School of Mineral Industry, ENIM, BP 753, Agdal, 10000 Rabat (Morocco)

    2008-07-01

    and D programs is in process; several kinds of scientific exchanges are engaged to provide a scientific network aiming to master a multidimensional learning: a capacity building strategy is targeted to study the means to face the NPP's relevant challenges and improve the labour sector standards in order to make nuclear power a viable option. (author)

  15. Infrastructures Development Strategy in Energy Engineering Education and Research: a Bonus to Introduce a Safe and Secure Nuclear Power Program

    International Nuclear Information System (INIS)

    Bouhelal, Oum Keltoum

    2008-01-01

    programs is in process; several kinds of scientific exchanges are engaged to provide a scientific network aiming to master a multidimensional learning: a capacity building strategy is targeted to study the means to face the NPP's relevant challenges and improve the labour sector standards in order to make nuclear power a viable option. (author)

  16. Using intervention mapping for the development of a targeted secure web-based outreach strategy named SafeFriend, for Chlamydia trachomatis testing in young people at risk.

    Science.gov (United States)

    Theunissen, Kevin A T M; Hoebe, Christian J P A; Crutzen, Rik; Kara-Zaïtri, Chakib; de Vries, Nanne K; van Bergen, Jan E A M; van der Sande, Marianne A B; Dukers-Muijrers, Nicole H T M

    2013-10-22

    Many young people at high risk for Chlamydia trachomatis (Ct) are not reached by current sexual health care systems, such as general practitioners and public sexual health care centres (sexually transmitted infection clinics).Ct is the most frequently diagnosed bacterial sexually transmitted infection (STI) among sexually active people and in particular young heterosexuals. Innovative screening strategies are needed to interrupt the transmission of Ct among young people and connect the hidden cases to care. Intervention Mapping (IM), a systematic approach to develop theory- and evidence-based interventions, was used to develop a strategy to target Ct testing towards young people who are currently hidden to care in The Netherlands. Both clinical users (i.e. sexual health care nurses) and public users (i.e., young people at risk for Ct) were closely involved in the IM process. A needs assessment study was carried out using semi-structured interviews among users (N = 21), a literature search and by taking lessons learned from existing screening programmes. Theoretical methods and practical applications to reach high risk young people and influence testing were selected and translated into specific programme components. The IM approach resulted in the development of a secure and web-based outreach Ct screening strategy, named SafeFriend. It is developed to target groups of high-risk young people who are currently hidden to care. Key methods include web-based Respondent Driven Sampling, starting from young Ct positive sexual health care centre clients, to reach and motivate peers (i.e., sex partners and friends) to get tested for Ct. Testing and the motivation of peers were proposed as the desired behavioural outcomes and the Precaution Adoption Process Model was chosen as theoretical framework. End users, i.e., young people and sexual health care nurses were interviewed and included in the development process to increase the success of implementation. IM proved useful

  17. U.S. Geological Survey natural hazards science strategy: promoting the safety, security, and economic well-being of the Nation

    Science.gov (United States)

    Holmes, Robert R.; Jones, Lucile M.; Eidenshink, Jeffery C.; Godt, Jonathan W.; Kirby, Stephen H.; Love, Jeffrey J.; Neal, Christina A.; Plant, Nathaniel G.; Plunkett, Michael L.; Weaver, Craig S.; Wein, Anne; Perry, Suzanne C.

    2013-01-01

    The mission of the U.S. Geological Survey (USGS) in natural hazards is to develop and apply hazard science to help protect the safety, security, and economic well-being of the Nation. The costs and consequences of natural hazards can be enormous, and each year more people and infrastructure are at risk. USGS scientific research—founded on detailed observations and improved understanding of the responsible physical processes—can help to understand and reduce natural hazard risks and to make and effectively communicate reliable statements about hazard characteristics, such as frequency, magnitude, extent, onset, consequences, and where possible, the time of future events. To accomplish its broad hazard mission, the USGS maintains an expert workforce of scientists and technicians in the earth sciences, hydrology, biology, geography, social and behavioral sciences, and other fields, and engages cooperatively with numerous agencies, research institutions, and organizations in the public and private sectors, across the Nation and around the world. The scientific expertise required to accomplish the USGS mission in natural hazards includes a wide range of disciplines that this report refers to, in aggregate, as hazard science. In October 2010, the Natural Hazards Science Strategy Planning Team (H–SSPT) was charged with developing a long-term (10–year) Science Strategy for the USGS mission in natural hazards. This report fulfills that charge, with a document hereinafter referred to as the Strategy, to provide scientific observations, analyses, and research that are critical for the Nation to become more resilient to natural hazards. Science provides the information that decisionmakers need to determine whether risk management activities are worthwhile. Moreover, as the agency with the perspective of geologic time, the USGS is uniquely positioned to extend the collective experience of society to prepare for events outside current memory. The USGS has critical

  18. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  19. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  20. Impact of Euro-Canadian agrarian practices: in search of sustainable import-substitution strategies to enhance food security in subarctic Ontario, Canada.

    Science.gov (United States)

    Spiegelaar, Nicole F; Tsuji, Leonard J S

    2013-01-01

    In Canada, food insecurity exists among Aboriginal (Inuit, Metis and First Nations) people living in remote northern communities, in part, because of their reliance on the industrialized, import-based food system. Local food production as a substitute to imports would be an adaptive response, but enhancement of food security via food localization requires reflection on previous failings of conventional agricultural strategies so that informed decisions can be made. In light of potential reintroduction of local food production in remote First Nations communities, we investigated the cultural, social and ecological effects of a 20th century, Euro-Canadian agrarian settlement on the food system of a subarctic First Nation; this will act as the first step in developing a more sustainable local food program and enhancing food security in this community. To investigate the socio-cultural impacts of the Euro-Canadian agrarian initiative on the food system of Fort Albany First Nation, purposive, semi-directive interviews were conducted with elders and other knowledgeable community members. Interview data were placed into themes using inductive analyses. To determine the biophysical impact of the agrarian initiative, soil samples were taken from one site within the cultivated area and from one site in an undisturbed forest area. Soil properties associated with agricultural use and productivity were assessed. To compare the means of a given soil property between the sites, one-tailed t-tests were employed. Vegetative analysis was conducted in both sites to assess disturbance. According to the interviewees, prior to the agrarian initiative, First Nation families harvested wild game and fish, and gathered berries as well as other forms of vegetation for sustenance. With the introduction of the residential school and agrarian initiative, traditional food practices were deemed inadequate, families were forced to work and live in the settlement (becoming less reliant on

  1. Augmentation of clozapine with amisulpride: an effective therapeutic strategy for violent treatment-resistant schizophrenia patients in a UK high-security hospital.

    Science.gov (United States)

    Hotham, James E; Simpson, Patrick J D; Brooman-White, Rosalie S; Basu, Amlan; Ross, Callum C; Humphreys, Sharon A; Larkin, Fintan; Gupta, Nitin; Das, Mrigendra

    2014-10-01

    Clozapine is used in the management of treatment-resistant schizophrenia and is effective in reducing aggression; however a subgroup of patients is poorly responsive. For violent patients in this group, there is limited literature on the use of strategies to augment clozapine with other agents. Here we present a case series of 6 schizophrenia patients, within a high-security hospital, who have a history of serious violence and who were treated with clozapine augmented with amisulpride. We reviewed case notes and health records for evidence of violence/aggression and positive factors such as engagement in activities, and Clinical Global Impression (CGI) scores were formulated. We also examined metabolic parameters before and after augmentation. All 6 of the patients showed clinical improvement in symptoms and a reduction in their risk of violence to others. Five patients had a reduction in number of violent/aggressive incidents, and all patients showed improvement in engagement in occupational, vocational, and/or psychological work. Metabolic parameters were largely unchanged except for 1 patient whose Body Mass Index (BMI) increased. Five patients reported side effects as unchanged or improved. These schizophrenia patients with a history of violence showed clinical improvement and reduced aggression and violence with amisulpride augmentation of clozapine. To our knowledge, this is the first report of an antiaggressive benefit of this combination in forensic psychiatric patients. Further studies are warranted to establish the efficacy and anti-aggressive effects of amisulpride augmentation of clozapine.

  2. The liberalization of the European electric and gas industries through the firms' M and A and investment strategies: propositions for a better energy security

    International Nuclear Information System (INIS)

    Benhassine, W.

    2009-04-01

    The electric and gas industries have been traditionally managed by public monopolies. The post World War II context was supportive to such an industrial organization. In fact, Europe was getting engaged in a long period of economic growth and was benefiting a favorable energetic context. At the end of the 90's, Europe decides to liberalize the national energy industries in order to create a unique European energy market. This liberalization has occurred in a context that as dramatically changed from the economic and energetic perspective. Indeed, the globalization phenomenon has strengthened the competitiveness of the emerging economies. The strong growth of the energy demand and the stagnation of the supply on the offer side have created tensions which have been increasingly frequent and important on the energy markets. Besides, facing greater budget restrictions and financial difficulties, the states have wished to get financially disengaged from these industries. Many factors show that the economic and energetic context will not get better in the next decades. Hence, in this new context, the liberalization of the energy industries should respond to two major stakes for the energy security of the European countries: the sustainability of the investments and the control of the energy demand. After having studied the merger and investment strategies of the energy firms, operating within a freshly liberalized sector, we make some propositions to draw up a new industrial organization which would allow a more efficient response to these two stakes. (author)

  3. Framework for a Risk-Informed Groundwater Compliance Strategy for Corrective Action Unit 98: Frenchman Flat, Nevada National Security Site, Nye County, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam

    2010-09-01

    Note: This document was prepared before the NTS was renamed the Nevada National Security Site (August 23, 2010); thus, all references to the site herein remain NTS. Corrective Action Unit (CAU) 98, Frenchman Flat, at the Nevada Test Site (NTS) was the location of ten underground nuclear tests between 1965 and 1971. As a result, radionuclides were released in the subsurface in the vicinity of the test cavities. Corrective Action Unit 98 and other CAUs at the NTS and offsite locations are being investigated. The Frenchman Flat CAU is one of five Underground Test Area (UGTA) CAUs at the NTS that are being evaluated as potential sources of local or regional impact to groundwater resources. For UGTA sites, including Frenchman Flat, contamination in and around the test cavities will not be remediated because it is technologically infeasible due to the depth of the test cavities (150 to 2,000 feet [ft] below ground surface) and the volume of contaminated groundwater at widely dispersed locations on the NTS. Instead, the compliance strategy for these sites is to model contaminant flow and transport, estimate the maximum spatial extent and volume of contaminated groundwater (over a period of 1,000 years), maintain institutional controls, and restrict access to potentially contaminated groundwater at areas where contaminants could migrate beyond the NTS boundaries.

  4. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  5. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  6. The Era of Mobile Internet Mobile Phone Information Security Strategy of Shallow Research%移动互联网时代手机信息安全策略

    Institute of Scientific and Technical Information of China (English)

    黄赛

    2015-01-01

    Articles focus on mobile Internet hand on behalf of the smartphone security issues, from the communication network selection strategy, the mobile terminal selection strategy, the use of mobile phones security policy, social information security environment to create four latitude on smartphone security strategy for full range analysis, introduce, strive for ordinary readers fully understand the safety problem of the intelligent mobile phone and application in the reality of life and learning, so that everyone's smartphone safer and more at ease.%文章聚焦于移动互联网手代智能手机安全问题,从通信网络选择策略、手机终端选择策略、手机使用安全策略、社会信息安全环境营造四个纬度对智能手机安全策略进行全方位的分析、介绍,力求让普通读者全面了解掌握智能手机安全问题,并应用于现实生活学习中,从而使大家的智能手机更安全、使用更放心。

  7. Diagnosing integrated food security strategies

    NARCIS (Netherlands)

    Candel, Jeroen J.L.

    2018-01-01

    The global food price crises of 2007-8 and 2010 and subsequent policy debates have led to increased recognition that the drivers of food insecurity and associated policies transcend the boundaries of traditional governmental sectors and jurisdictions. Building on this insight, many governments of

  8. Nuclear power plants; security strategy

    International Nuclear Information System (INIS)

    Sidorenko, V.A.

    1989-01-01

    Safety standards and approaches to NPPs safety resulting from multilayer experience are presented. It is stressed that sufficiency and efficiency of reactor safety measures should be payed constant attention. Real evolution of accidents reqires unlimited development of new safety means. It is evident that in nuclear power there should exist high s afety culture . NPPs safety should be guaranteed by joint measures of both specialists ans public

  9. Successful Characterization Strategies for the Active High Risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164

    Energy Technology Data Exchange (ETDEWEB)

    Birchfield, Joseph W. III [Link Technologies (United States); Albrecht, Linda [Alliant Corporation (United States)

    2012-07-01

    Building 9201-5 (Alpha 5) was completed in May 1944 and served as a production facility for National Nuclear Security Administration (NNSA) Y-12 Weapons Plant. During the Manhattan Project, it functioned as a uranium enrichment facility. The facility was renovated and altered over the years, converting the calutrons to support other missions. Alpha 5 consists of 4 floors and a basement measuring approximately 600,000 square feet. The facility contains various pieces of equipment remaining from legacy operations. A significant amount (approximately 200,000 kgs) of mercury (Hg) has been spilled in the facility over the operational history of the building. To further complicate matters, beryllium (Be) contamination in 9201-5 is found throughout approximately sixty percent of the facility. Concentrations varying from very low (< 0.2 micrograms (μg)/100 cm{sup 2}) to areas where concentrations are relatively high, approximately 600 μg/100 cm{sup 2}, in regulated beryllium areas. The primary site related contaminants (SRCs) for the waste in this facility are enriched uranium, depleted uranium, beryllium and mercury. This facility represents the highest environmental risk for DOE-ORO EM and NNSA at Y-12 and must be quickly addressed to minimize impacts to future Y-12 missions, as well as human health and the environment. As part of the American Recovery and Reinvestment Act (ARRA), approximately 700,000 cubic feet of legacy material was removed in 2010 and 2011. In addition, characterization of the 9201-5 facility was scheduled in the winter and spring of 2011. This activity was initiated in January 2011 and was completed in July 2011. Heavy schedule pressure was further complicated by the fact that this building has active utility, security and process systems. Given these complex variables, a unique, out of the box characterization strategy was forged in an effort to bound radiological and chemical contaminants, as well as providing the appropriate level of quality to

  10. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  13. 基于Android系统的手机信息安全分析及策略改进%The Information Security Analysis and Strategy Improvement of AndroidMobile Phone

    Institute of Scientific and Technical Information of China (English)

    贾能

    2016-01-01

    随着移动互联网的发展,Android智能手机在市场上占据着很大的份额。文章首先分析了Android现有的安全机制沙箱模型和数字证书,然后提出Android系统存在的安全问题,最后从系统开发者和用户2个角度设计安全策略来对现有的安全策略进行改进。%With the development of mobile Internet, mobile phones using Androidsystem occupy a large share in the market. First of all, this paper analyzes sandbox model and digital certiifcate which are the existing security mechanisms of Androidsystem. Secondly, security problems in the Androidsystem have been put forward. Finally, security strategies are designed from two angles of system developers and users to improve the existing security strategy.

  14. 电力二次系统主动安全防御策略及实现%An Active Security Defense Strategy and Its Implementation for the Power Secondary System

    Institute of Scientific and Technical Information of China (English)

    冯兆红; 贾铁军

    2015-01-01

    在分析数据安全和业务安全保护侧重点的基础上,结合电力二次系统结构对系统按数密和业密级别高低进行安全分区。针对电力二次系统的业务实际及其运行过程中存在的不安全因素,对内外网之间进行通信安全部署,提出主动安全防御策略,有效地解决了电力二次系统中存在的数据和业务安全保护的矛盾,提高了系统的检测辨识能力及整体防御功效。%On the basis of analyzing the protection sides of data security and business security,the power secondary system is divided into different sections according to the level of data secrecy and business secrecy.Under consideration of actual business of the power secondary system and unsafe factors in its operation,this paper makes a communication security deployment between the internal and external networks and proposes an active security defense strategy,thus effectively resolving the contradiction between data and business security protection in the power secondary system and improving the detection identification ability of the system.

  15. Methodology for safety and security of radioactive sources and materials. The Israeli approach

    International Nuclear Information System (INIS)

    Keren, M.

    1998-01-01

    About 10 Radioactive incidents occurred in Israel during 1996-1997. Some of them were theft or lost of Radioactive equipment or sources, some happened because misuse of Radioactive equipment and some of other reasons. Part of them could be eliminated if a better methodological attitude to the subject existed. A new methodology for notification, registration and licensing is described. Hopefully this methodology will increase defense in depth and the Safety and Security of Radioactive sources and materials. Information on the inventory of Radioactive sources and materials is essential. Where they are situated, what is the supply rate or all history from berth to grave. Persons involved are important: Who are the Radiation Safety Officers (RSO), what is their training and updating programs. As much as possible information on the site and places where those Radioactive sources and materials are used. Procedures for security of sources and materials is part of site information, beside safety precautions. Users are obliged to inform on any changes and to ask for confirmation to those changes. The same is when high activity sources are moved across the country. (author)

  16. Alleged Genocide in Sudan - Where Does the US National Security Strategy Take Us in Light of the UN Genocide Convention and Lingering Memories of Failure to Intervene in Rwanda

    National Research Council Canada - National Science Library

    Block, Greg

    2005-01-01

    .... Using Rwanda as a baseline and the current situation in Sudan as a case study this project examines the US response to the alleged genocide from the perspective of the US as a signatory to the Genocide Convention. Given the US National Security Strategy what are the competing interests and concerns that impact this crisis? And what is the appropriate response to this crisis? Is there something about this specific allegation of genocide that suggests prevention efforts will succeed or fail?

  17. Infrastructure to support trading strategies against the occurrence of extraordinary events: Secure area of the equipment storage; Infraestructura de apoyo a las estrategias de operacion frente a la ocurrencia de sucesos extraordinarios: Area segura de almacenamiento de equipos

    Energy Technology Data Exchange (ETDEWEB)

    Blas Gordo, A. de; Asensio Vega, J.; Fernandez Morales, E. J.; Font Hadinger, I.

    2013-07-01

    Compliance with the requirements specified in the Technical Instructions ITC and ITC-1-2, issued by the Nuclear Safety Council (CSN), is conducting exhaustive analyzes on coping in Nuclear Power Plants emergencies due to the occurrence extraordinary events. As part of the necessary infrastructure, a secure area for parking and storage of projects teams involved in the development of various operational strategies. The design of it ensures compliance with all regulatory and practical requirements, ensuring minimization strategies and time functionality in the application of the same.

  18. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  19. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  20. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  1. Ethical Hacking in Information Security Curricula

    Science.gov (United States)

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  2. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2002-06-01

    The Green Paper on the security of energy supply, adopted by the Commission more than a year ago, opened up a debate on energy policy unprecedented in 30 years. In most of the Member States this debate revived discussion on national options in the energy field. Looking ahead to the next twenty to thirty years, the Green Paper drew attention to the structural weaknesses and geopolitical, social and environmental shortcomings of the EU energy supply, notably as regards European commitments in the Kyoto Protocol. The European economy, steadily demanding more and more energy, is essentially based on fossil fuels. The Green Paper offers a clear strategy based on demand management. It has the merit of pointing out that the EU has little room for manoeuvre with regard to energy supply notably due to its low, or in certain cases less competitive (e.g. coal), energy resources. Therefore it is appropriate for the Union to concentrate on guiding and steering demand, unlike the United States which, in the energy plan it announced in May 2001, seeks to meet demand by constantly boosting supply. The Green Paper put 13 questions as a framework for the general debate. The conclusion is that there is virtually unanimous agreement on the strategic axis of demand management: energy consumption must be guided and steered. The conclusions of the Barcelona European Council, stressing in particular the need for better energy efficiency by 2010 and rapid adoption of energy taxation proposals, clearly give political backing to this priority. Without waiting for the debate to end, the Commission made some very well received proposals along these lines, involving actual legislation and not just encouraging words or exchange of good practice, some of which have already been adopted by the Council and the European Parliament. One of these proposals in particular was the Directive on electricity production from renewable sources, adopted in 2001. Another was the proposal for a Directive on

  3. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-06-15

    The Green Paper on the security of energy supply, adopted by the Commission more than a year ago, opened up a debate on energy policy unprecedented in 30 years. In most of the Member States this debate revived discussion on national options in the energy field. Looking ahead to the next twenty to thirty years, the Green Paper drew attention to the structural weaknesses and geopolitical, social and environmental shortcomings of the EU energy supply, notably as regards European commitments in the Kyoto Protocol. The European economy, steadily demanding more and more energy, is essentially based on fossil fuels. The Green Paper offers a clear strategy based on demand management. It has the merit of pointing out that the EU has little room for manoeuvre with regard to energy supply notably due to its low, or in certain cases less competitive (e.g. coal), energy resources. Therefore it is appropriate for the Union to concentrate on guiding and steering demand, unlike the United States which, in the energy plan it announced in May 2001, seeks to meet demand by constantly boosting supply. The Green Paper put 13 questions as a framework for the general debate. The conclusion is that there is virtually unanimous agreement on the strategic axis of demand management: energy consumption must be guided and steered. The conclusions of the Barcelona European Council, stressing in particular the need for better energy efficiency by 2010 and rapid adoption of energy taxation proposals, clearly give political backing to this priority. Without waiting for the debate to end, the Commission made some very well received proposals along these lines, involving actual legislation and not just encouraging words or exchange of good practice, some of which have already been adopted by the Council and the European Parliament. One of these proposals in particular was the Directive on electricity production from renewable sources, adopted in 2001. Another was the proposal for a Directive on

  4. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  5. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  6. Dust limit management strategy in tokamaks

    International Nuclear Information System (INIS)

    Rosanvallon, S.; Grisolia, C.; Andrew, P.; Ciattaglia, S.; Delaporte, P.; Douai, D.; Garnier, D.; Gauthier, E.; Gulden, W.; Hong, S.H.; Pitcher, S.; Rodriguez, L.; Taylor, N.; Tesini, A.; Vartanian, S.; Vatry, A.; Wykes, M.

    2009-01-01

    Dust is produced in tokamaks by the interaction between the plasma and the plasma facing components. Dust has not yet been of a major concern in existing tokamaks mainly because the quantity is small and these devices are not nuclear facilities. However, in ITER and in future reactors, it will represent operational and potential safety issues. From a safety point of view, in order to control the potential dust hazard, the current ITER strategy is based on a defense in depth approach designed to provide reliable confinement systems, to avoid failures, and to measure and minimise the dust inventory. In addition, R and D is put in place for optimisation of the proposed methods, such as improvement of measurement, dust cleaning and the reduction of dust production. The aim of this paper is to present the approach for the control of the dust inventory, relying on the monitoring of envelope values and the development of removal techniques already developed in the existing tokamaks or plasma dedicated devices or which will need further research and development in order to be integrated in ITER.

  7. Dust limit management strategy in tokamaks

    Science.gov (United States)

    Rosanvallon, S.; Grisolia, C.; Andrew, P.; Ciattaglia, S.; Delaporte, P.; Douai, D.; Garnier, D.; Gauthier, E.; Gulden, W.; Hong, S. H.; Pitcher, S.; Rodriguez, L.; Taylor, N.; Tesini, A.; Vartanian, S.; Vatry, A.; Wykes, M.

    2009-06-01

    Dust is produced in tokamaks by the interaction between the plasma and the plasma facing components. Dust has not yet been of a major concern in existing tokamaks mainly because the quantity is small and these devices are not nuclear facilities. However, in ITER and in future reactors, it will represent operational and potential safety issues. From a safety point of view, in order to control the potential dust hazard, the current ITER strategy is based on a defense in depth approach designed to provide reliable confinement systems, to avoid failures, and to measure and minimise the dust inventory. In addition, R&D is put in place for optimisation of the proposed methods, such as improvement of measurement, dust cleaning and the reduction of dust production. The aim of this paper is to present the approach for the control of the dust inventory, relying on the monitoring of envelope values and the development of removal techniques already developed in the existing tokamaks or plasma dedicated devices or which will need further research and development in order to be integrated in ITER.

  8. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  9. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  10. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  11. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  12. Application of the Defense-in-Depth Concept in the Projects of New-Generation NPPs Equipped with VVER Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Shvyryaev, Yu. V.; Morozov, V. B.; Kuchumov, A.Yu., E-mail: morozov@aep.ru [JSC Atomenergoproekt, Moscow (Russian Federation)

    2014-10-15

    The projects of new-generation NPPs equipped with VVER reactors are developed as projects the safety level of which is superior to that of NPPs that are currently in operation. The main design solutions adopted for implementing the defence-in-depth (DiD) concept in the projects of new-generation NPPs equipped with VVER reactors are briefly characterized in the paper. (author)

  13. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    accompany the drawing up of a new security strategy for the country. A step in the right direction would be if, after public debate, the Government submitted a new version of the country’s security strategy for consideration and approval to the Parliament as the supreme representative body. The new strategy would thus be assigned greater importance than that of 2003 which was adopted only by the Government and, as a result, was often denied the status of a binding document. A broader public debate over the new security strategy would help ensure that the extended concept of security is more fully implemented in practice.

  14. Summary of the third control system cyber-security (CS)2/HEP workshop

    International Nuclear Information System (INIS)

    Lueders, S.

    2012-01-01

    Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being altered. The third (CS)2/HEP workshop was intended to raise awareness; exchange good practices, ideas, and implementations; discuss what works and what not as well as their pros and cons; report on security events, lessons learned and successes; and update on progresses made at HEP laboratories around the world in order to secure control systems. It appears that deploying a 'Defense-in-depth approach is mandatory and corresponds to good practice while the full compliance to ISO-27000 standard is definitely both an ultimate goal and a very difficult challenge. There was a broad consensus to state that developing a 'security culture' among the players whatever they are: system experts, administrators, vendors or operators is the first step to do

  15. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  16. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  17. Regulator Interface Strategies Implemented at the Y-12 National Security Complex Old Salvage Yard Soils Remediation Project, Oak Ridge, TN - 12162

    Energy Technology Data Exchange (ETDEWEB)

    Albrecht, Linda [Alliant Corporation (United States); Wilkerson, Laura; Skinner, Ralph [US DOE-ORO EM (United States); Birchfield, Joseph W. III [Link Technologies (United States)

    2012-07-01

    The Oak Ridge Y-12 National Security Complex housed an area known as the Old Salvage Yard (OSY) that was approximately 7 acres. The OSY was used as an area for the accumulation, processing and storage of scrap metal and equipment from Y-12 operations extending from 1968 until 2009. Areas in the northern sections of OSY also have been used for the storage of used oils containing solvents and the accumulation and recycling or de-heading and crushing of 55-gal metal drums. Scrap metal operations historically involved the accumulation, sorting, storage, public sale or disposal of scrap metal and equipment. Non-containerised storage of scrap metal was routine until 1995 when scrap metal received at OSY was placed in B-24 and B-25 boxes. Under the American Recovery and Reinvestment Act (ARRA), approximately 26,759 cubic meters of scrap metal and debris were removed and disposed at both on and off-site disposal facilities including the on-site, Oak Ridge Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) landfill in 2010 and 2011. This removal action was performed in accordance with a CERCLA Record of Decision (ROD) and a close working relationship with both the U.S. Environmental Protection Agency (EPA) Region IV and Tennessee Department of Environment and Conservation (TDEC). Due to efficiencies and the excellent cooperative relationship forged with EPA Region IV and TDEC for Y-12 ARRA Cleanup Projects, a surplus of funding was available for additional remediation work that was completed in fiscal year (FY) 2011. The underlying OSY soils were targeted for characterization and potential remediation. To expedite these important activities, the U.S. Department of Energy Oak Ridge Environmental Management partnered with the regulators during detailed planning sessions through a variety of means to quickly and efficiently characterize and pinpoint areas requiring remediation according to previous ROD commitments. Data Quality Objectives (DQOs

  18. A framework for assessing severe accident management strategies

    International Nuclear Information System (INIS)

    Kastenberg, W.E.; Apostolakis, G.; Dhir, V.K.; Okrent, D.; Jae, M.; Lim, H.; Milici, T.; Park, H.; Swider, J.; Xing, L.; Yu, D.

    1991-01-01

    Accident management can be defined as the innovative use of existing and or alternative resources, systems and actions to prevent or mitigate a severe accident. Together with risk management (changes in plant operation and/or addition of equipment) and emergency planning (off-site actions), accident management provides an extension of the defense-in-depth safety philosophy for severe accidents. A significant number of probabilistic safety assessments (PSA) have been completed which yield the principal plant vulnerabilities. For each sequence/threat and each combination of strategy there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These considerations include uncertainty in key phenomena, uncertainty in operator behavior, uncertainty in system availability and behavior, and uncertainty in available information (i.e., instrumentation). The objective of this project is to develop a methodology for assessing severe accident management strategies given the key uncertainties mentioned above. Based on Decision Trees and Influence Diagrams, the methodology is currently being applied to two case studies: cavity flooding in a PWR to prevent vessel penetration or failure, and drywell flooding in a BWR to prevent containment failure

  19. A framework for the assessment of severe accident management strategies

    International Nuclear Information System (INIS)

    Kastenberg, W.E.; Apostolakis, G.; Dhir, V.K.; Okrent, D.; Jae, M.; Lim, H.; Milici, T.; Park, H.; Swider, J.; Xing, L.; Yu, D.

    1992-01-01

    Accident management can be defined as the innovative use of existing and or alternative resources, systems and actions to prevent or mitigate a severe accident. Together with risk management (changes in plant operation and/or addition of equipment) and emergency planning (off-site actions), accident management provides an extension of the defense-in-depth safety philosophy for severe accidents. A significant number of probabilistic safety assessments (PSA) have been completed which yield the principal plant vulnerabilities. For each sequence/threat and each combination of strategy there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These considerations include uncertainty in key phenomena, uncertainty in operator behavior, uncertainty in system availability and behavior, and uncertainty in available information (i.e., instrumentation). The objective of this project is to develop a methodology for assessing severe accident management strategies given the key uncertainties mentioned above. Based on decision trees and influence diagrams, the methodology is currently being applied to two case studies: cavity flooding in a pressurized water reactor to prevent vessel penetration or failure, and drywell flooding in a boiling water reactor to prevent containment failure

  20. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  1. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  2. The National Military Strategy of the United States of America 2015: The United States Military’s Contribution to National Security

    Science.gov (United States)

    2015-06-01

    are amplified by shifting demographics. Youth populations are rapidly growing in Africa and the Middle East, regions that face resource shortages...fear in opponents and generate support for their causes. They use improvised explosive devices (IED), suicide vests, and tailored cyber tools to...our security relationship with India and build upon our partnerships with New Zealand, Singapore, Indonesia, Malaysia , Vietnam, and Bangladesh. Such

  3. Development of Mitigation Strategy for Beyond Design Basis External Events for NRC Design Certification

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Hak; Lee, Jae Jong; Kim, Myung Ki [KHNP Central Research Institute, Daejeon (Korea, Republic of)

    2013-10-15

    In this study, how to develop FLEX strategy for beyond-design-basis external events for U. S. NRC design certification is examined. The development method of FLEX strategy for U. S. NRC design certification is examined. The applicants should make unit-specific FLEX strategy and establish the minimum coping capabilities consistent with unit-specific evaluation of the potential impacts and responses to BDBEEs. NEI 12-06 outlines the process to define and deploy the diverse and flexible mitigation strategies(FLEX strategy) that will increase defense-in-depth for beyond-design-basis scenarios to address the extended loss of alternating current (ac) power (ELAP) and loss of normal access to the ultimate heat sink (LUHS) occurring simultaneously at all units on a site. The order (EA-12-049) is issued to all reactor licensees, including holders of active, Construction Permit (CP) holders, and Combined License (COL) holders. Applicants for the new reactor design certification should prepare and submit FLEX strategy for NRC staff's review. Site-specific data related with the new reactor can't be determined during the new reactor design certification applications so that the unit-specific FLEX strategy should be developed.

  4. Development of Mitigation Strategy for Beyond Design Basis External Events for NRC Design Certification

    International Nuclear Information System (INIS)

    Kim, Dong Hak; Lee, Jae Jong; Kim, Myung Ki

    2013-01-01

    In this study, how to develop FLEX strategy for beyond-design-basis external events for U. S. NRC design certification is examined. The development method of FLEX strategy for U. S. NRC design certification is examined. The applicants should make unit-specific FLEX strategy and establish the minimum coping capabilities consistent with unit-specific evaluation of the potential impacts and responses to BDBEEs. NEI 12-06 outlines the process to define and deploy the diverse and flexible mitigation strategies(FLEX strategy) that will increase defense-in-depth for beyond-design-basis scenarios to address the extended loss of alternating current (ac) power (ELAP) and loss of normal access to the ultimate heat sink (LUHS) occurring simultaneously at all units on a site. The order (EA-12-049) is issued to all reactor licensees, including holders of active, Construction Permit (CP) holders, and Combined License (COL) holders. Applicants for the new reactor design certification should prepare and submit FLEX strategy for NRC staff's review. Site-specific data related with the new reactor can't be determined during the new reactor design certification applications so that the unit-specific FLEX strategy should be developed

  5. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  6. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  7. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  8. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  9. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  10. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  11. Homeland Security Affairs Journal (press release)

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Homeland Defense and Security

    2013-01-01

    Homeland Security Affairs (HSA) is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  12. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  13. Sustainable Energy for All - What does it mean for Water and Food Security : Seeking sustainable development CLEWS: Climate-change, Land-use, Energy and Water (CLEW) Strategies

    OpenAIRE

    Hermann, Sebastian; Howells, Mark; Welsch, Manuel; Rogner, Hans Holger; Steduto, Pasquale; Gielen, Dolf; Roehrl, Alexander; Bazilian, Morgan

    2011-01-01

    This background note serves to inform the “hot topic” session entitled ‘Sustainable Energy for All – What does it mean for Water and Food Security?’.Energy is vital for human development. This is why the United Nations proclaimed 2012 as the ‘International Year of Sustainable Energy for All’. The goal is to ensure universal access to modern energy services by 2030. Today’s energy production, however, is already putting prohibitive strain on the global environment. In support of worldwide effo...

  14. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  15. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  16. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  17. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  18. The Potential Use of Agroforestry Community Gardens as a Sustainable Import-Substitution Strategy for Enhancing Food Security in Subarctic Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Maren Oelbermann

    2013-09-01

    Full Text Available The high prevalence of food insecurity experienced by northern First Nations partially results from dependence on an expensive import-based food system that typically lacks nutritional quality and further displaces traditional food systems. In the present study, the feasibility of import substitution by Agroforestry Community Gardens (AFCGs as socio-ecologically and culturally sustainable means of enhancing food security was explored through a case study of Fort Albany First Nation in subarctic Ontario, Canada. Agroforestry is a diverse tree-crop agricultural system that has enhanced food security in the tropics and subtropics. Study sites were selected for long-term agroforestry research to compare Salix spp. (willow-dominated AFCG plots to a “no tree” control plot in Fort Albany. Initial soil and vegetative analysis revealed a high capacity for all sites to support mixed produce with noted modifications, as well as potential competitive and beneficial willow-crop interactions. It is anticipated that inclusion of willow trees will enhance the long-term productive capacity of the AFCG test plots. As an adaptable and dynamic system, AFCGs have potential to act as a more reliable local agrarian system and a refuge for culturally significant plants in high-latitude First Nation socio-ecological systems, which are particularly vulnerable to rapid cultural, climatic, and ecological change.

  19. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  20. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  1. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  2. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  3. Institutional diagnostics for African food security

    NARCIS (Netherlands)

    Schouten, Greetje; Vink, Martinus; Vellema, Sietze

    2018-01-01

    Securing access to affordable and nutritious food is an urgent topic on the agenda for development strategies in Africa. Intervention strategies targeting food security triggered a long lasting debate whether science and technology driven interventions could be the panacea for hunger eradication.

  4. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  5. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  6. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  7. Development of Severe Accident Management Strategies for Shin-Kori 3 and 4

    International Nuclear Information System (INIS)

    Lee, Youngseung; Kim, Hyeongtaek; Shin, Jungmin

    2013-01-01

    Shin-Kori units 3 and 4 are new reactors under construction as an APR 1400 type reactor. The plants which considered coping with severe accident from design phase are different from other operating plants in view of severe accident management strategies. The purpose of this paper is to establish optimal strategies for Shin-Kori 3 and 4. A scheme for optimized severe accident management was drawn up with the object of achieving core cooling, containment integrity, and decreased release of fission product. Shin-Kori units 3 and 4 are a new reactor and designed to add mitigating systems for coping with severe accident such as ECSBS, PAR, and CFS. Also the plants are reflected as a part of Fukushima followup measures The strategies of SAMG for Shin-Kori 3 and 4 were developed. The strategic approach was based on the concept of defense in depth. Firstly, strategies for core cooling were chosen such as RCS depressurization, injection to SG, injection to RCS, and injection to reactor cavity. Secondly, the plans for containment integrity were developed for controlling pressure and hydrogen in containment. Lastly, reduced release of fission product was considered for protection of the public after containment failure. The achieved strategies meet the needs of effective methods for severe accident management and enhancement of safety

  8. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  9. U.S. Strategy for Bioterrorism Emergency Medical Preparedness and Response

    National Research Council Canada - National Science Library

    Lugo, Angel

    2003-01-01

    ... diseases and mass casualty dangers. The 2002 National Strategy for Homeland Security includes numerous emergency preparedness and response initiatives as part of the overall homeland security strategy...

  10. Cyber security in nuclear industry – Analytic study from the terror incident in nuclear power plants (NPPs)

    International Nuclear Information System (INIS)

    Cho, Hyo Sung; Woo, Tae Ho

    2017-01-01

    Highlights: • The cyber terrorism in NPPs of South Korea shows the study motivations. • Analyses of the cyber terrorism in NPPs are investigated. • Designed solutions for the cyber terrorism in NPPs are discussed. • South Korean case is considered as the cyber terrorism in NPPs. - Abstract: The cyber terrorism for nuclear power plants (NPPs) is investigated for the analytic study following the South Korean case on December 2014. There are several possible cyber terror attacks in which the twelve cases are studied for the nuclear terror cases including the computer hacking and data stealing. The defense-in-depth concept is compared for cyber terrorism, which was imported from the physical terror analysis. The conventional three conditions of the physical protection system (PPS) are modified as prevention, detection, and response. The six cases are introduced for the solutions of the facility against the possible cyber terrorism in NPPs. The computer hacking methods and related solutions are analyzed for the applications in the nuclear industry. The nuclear security in the NPPs could be an extremely serious condition and the remedies are very important in the safe plant operations. In addition, the quantitative modeling study is performed.

  11. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  12. Safety of radiation sources and security of radioactive materials. Contributed papers

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-09-01

    The International Atomic Energy Agency (IAEA) in co-operation with the European Commission (EC), International Criminal Police Organization (INTERPOL) and the World Customs Organization (WCO) organized an International Conference on the Safety of Radiation Sources and the Security of Radioactive Materials, in Dijon, France, from 14 to 18 September 1998. The Government of France hosted this Conference through the Commissariat a l`energie atomique, Direction des applications militaires (CEA/DAM). This TECDOC contains the contributed papers dealing with the topics of this Conference which were accepted by the Conference Programme Committee for presentation. The papers written in one of the two working languages of the Conference, English or French are presented here each by a separate abstract. Ten technical sessions covered the following subjects: the regulatory control of radiation sources, including systems for notification, authorization and inspection; safety assessment techniques applied to radiation sources and design and technological measures including defense in depth and good engineering practice; managerial measures, including safety culture, human factors, quality assurance, qualified experts, training and education; learning from operational experience; international co-operation, including reporting systems and databases; verification of compliance, monitoring of compliance and assessment of the effectiveness of national programmes for the safety of sources; measures to prevent breaches in the security of radioactive materials, experience with criminal acts involving radioactive materials; detection and identification technologies for illicitly trafficked radioactive materials; response to detected cases and seized radioactive materials, strengthening of the awareness, training and exchange of information. The IAEA plans to issue the proceedings of this Conference containing the invited presentations, rapporteurs and Chairpersons overviews and summaries

  13. Safety of radiation sources and security of radioactive materials. Contributed papers

    International Nuclear Information System (INIS)

    1998-09-01

    The International Atomic Energy Agency (IAEA) in co-operation with the European Commission (EC), International Criminal Police Organization (INTERPOL) and the World Customs Organization (WCO) organized an International Conference on the Safety of Radiation Sources and the Security of Radioactive Materials, in Dijon, France, from 14 to 18 September 1998. The Government of France hosted this Conference through the Commissariat a l'energie atomique, Direction des applications militaires (CEA/DAM). This TECDOC contains the contributed papers dealing with the topics of this Conference which were accepted by the Conference Programme Committee for presentation. The papers written in one of the two working languages of the Conference, English or French are presented here each by a separate abstract. Ten technical sessions covered the following subjects: the regulatory control of radiation sources, including systems for notification, authorization and inspection; safety assessment techniques applied to radiation sources and design and technological measures including defense in depth and good engineering practice; managerial measures, including safety culture, human factors, quality assurance, qualified experts, training and education; learning from operational experience; international co-operation, including reporting systems and databases; verification of compliance, monitoring of compliance and assessment of the effectiveness of national programmes for the safety of sources; measures to prevent breaches in the security of radioactive materials, experience with criminal acts involving radioactive materials; detection and identification technologies for illicitly trafficked radioactive materials; response to detected cases and seized radioactive materials, strengthening of the awareness, training and exchange of information. The IAEA plans to issue the proceedings of this Conference containing the invited presentations, rapporteurs and Chairpersons overviews and summaries

  14. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  15. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  16. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  17. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  18. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  19. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  20. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  1. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  2. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  3. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  4. Natural Resources Management for Sustainable Food Security in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Natural Resources Management for Sustainable Food Security in the Sahel ... as well as strategies for managing the resource base with a view to improving food security. ... InnoVet-AMR grants to support development of innovative veterinary ...

  5. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  6. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  7. INL Vision and Strategy 2015

    International Nuclear Information System (INIS)

    Pillai, Rekha Sukamar

    2015-01-01

    This Laboratory vision and strategy presents INL's vision and strategy for the Laboratory and is our introduction to a special place dedicated to improving our nation's energy security future.

  8. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    computer codes and methodologies applied to SSTAR. Another section of the report details the SSTAR safety design approach which is based upon defense-in-depth providing multiple levels of protection against the release of radioactive materials and how the inherent safety features of the lead coolant, nitride fuel, fast neutron spectrum core, pool vessel configuration, natural circulation, and containment meet or exceed the requirements for each level of protection. The report also includes recent results of a systematic analysis by LANL of data on corrosion of candidate cladding and structural material alloys of interest to SSTAR by LBE and Pb coolants; the data were taken from a new database on corrosion by liquid metal coolants created at LANL. The analysis methodology that considers penetration of an oxidation front into the alloy and dissolution of the trailing edge of the oxide into the coolant enables the long-term corrosion rate to be extracted from shorter-term corrosion data thereby enabling an evaluation of alloy performance over long core lifetimes (e.g., 30 years) that has heretofore not been possible. A number of candidate alloy specimens with special treatments or coatings which might enhance corrosion resistance at the temperatures at which SSTAR would operate were analyzed following testing in the DELTA loop at LANL including steels that were treated by laser peening at LLNL; laser peening is an approach that alters the oxide-metal bonds which could potentially improve corrosion resistance. LLNL is also carrying out Multi-Scale Modeling of the Fe-Cr system with the goal of assisting in the development of cladding and structural materials having greater resistance to irradiation.

  9. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  10. Simplified Threshold RSA with Adaptive and Proactive Security

    DEFF Research Database (Denmark)

    Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2006-01-01

    We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security...... of a proactive threshold signature scheme which was previously assumed to be only statically secure. As a separate contribution we prove that our protocol is secure in the UC framework....

  11. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...

  12. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...

  13. Austrian Security Strategy: Need For Reformulation Due To Security Developments

    Science.gov (United States)

    2016-02-14

    accession to the North Atlantic Treaty Organization (NATO) as an option. Under the Austrian Constitution , the federal government wanted to maintain the...the Middle East and Africa completely overwhelmed the police at the border crossing between Austria and Hungary and Slovenia . On 14 September 2015...Hungary, Croatia, and Slovenia .33, 34, 35 At the end of October 2015 refugees broke through the barriers several times at the border crossing point

  14. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  15. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  16. Secure direct communication based on secret transmitting order of particles

    International Nuclear Information System (INIS)

    Zhu Aidong; Zhang Shou; Xia Yan; Fan Qiubo

    2006-01-01

    We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication

  17. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  18. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  19. A Design Methodology for Computer Security Testing

    OpenAIRE

    Ramilli, Marco

    2013-01-01

    The field of "computer security" is often considered something in between Art and Science. This is partly due to the lack of widely agreed and standardized methodologies to evaluate the degree of the security of a system. This dissertation intends to contribute to this area by investigating the most common security testing strategies applied nowadays and by proposing an enhanced methodology that may be effectively applied to different threat scenarios with the same degree of effectiveness. ...

  20. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  1. Towards Comprehensive Food Security Measures: Comparing Key ...

    African Journals Online (AJOL)

    Food security is a multi-dimensional issue that has been difficult to measure comprehensively, given the one-dimensional focus of existing indicators. Three indicators dominate the food security measurement debate: Household Food Insecurity Access Scale (HFIAS), Dietary Diversity Score (DDS) and Coping Strategies ...

  2. Social Security and Fighting Poverty in Tunisia

    Directory of Open Access Journals (Sweden)

    Hasna Khemili

    2018-02-01

    Full Text Available The objective of this study was to examine the role of social security in fighting poverty in Metlaoui, Tunisia, using survey data collected between July 2012 and January 2014, covering 200 poor households. We used questionnaire data, which gave a thorough analysis of the reactions, behavior, and strategies adopted by poor households as a result of various forms of risk. Social security has an effect on a number of different areas, including health, education, housing, and income. Our methodology explored both complete and partial risk-sharing, to investigate the impact of social security schemes on the strategies adopted by households to cope with economic shocks. The estimation results of different models showed that social security could help social security-covered households choose less costly strategies to cope with risks. However, the role of social security remains insufficient, given that covered households had less confidence in its services and they adopted strategies of self-insurance or income smoothing. Overall, the results showed that social security plays an important role in Metlaoui, but it remains insufficient, especially for households that are not covered by social security and are suffering from heavy health expenditures.

  3. Privacy and security disclosures on telecardiology websites

    NARCIS (Netherlands)

    Dubbeld, L.

    2006-01-01

    This article discusses telemedicine providers¿ online privacy and security disclosures. It presents the results of an exploratory study of a number of telecardiology companies¿ Web sites, providing insight in some of the current strategies towards data protection and information security in the

  4. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  5. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    The Administration is claiming success in reversing the deterioration in security that had become acute by the end of 2006, attributing the gains to a troop surge strategy announced by President Bush on January 10, 2007...

  6. 国家网络安全审查制度的法律困惑与中国策略%Legal puzzlements and the Chinese strategies for the national cyber-security inspection system

    Institute of Scientific and Technical Information of China (English)

    马民虎; 马宁

    2015-01-01

    我国网络安全审查制度存在诸多亟待解答的法律困惑,对于网络安全审查制度本身也存在需要修正的“误读”,为了避免“贸易保护主义”对制度本身正当性造成的减损,应当有针对性地实施中国策略,实现网络安全审查的应然状态,坚持以风险控制为审查目的,以 IT 供应链为审查范围,以立法和标准为审查基础。%Currently,China’s national cyber-security inspection system still has many legal puzzle-ments waiting to be solved urgently,as well as some “misinterpretations”.To avoid the damage to its justification caused by the “trade protectionism”,we should purposely implement the Chinese strate-gies in order to achieve the ideal state for this system with the risk-control as the aim,IT supply chain as the inspection coverage and the legislation and criterion as the basis.

  7. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  8. Homeland Security - Can It be Done?

    Science.gov (United States)

    2003-04-07

    and get past the shenanigans in Congress and implement homeland security strategies.ř The new DHS is scheduled to move 22 federal agencies and...uniform laws to license and regulate certain financial services, since terrorists exploit such services. The strategy also takes care with definitions...initiative from organizations interested in the security of sensitive information, such as financial services, healthcare, and government. 47Joseph R. Barnes

  9. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  10. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  11. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  12. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  13. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  14. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  15. U.S. Army War College Guide to Strategy

    National Research Council Canada - National Science Library

    Cerami, Joseph

    2001-01-01

    For more than 3 decades, the Army War College Department of National Security and Strategy has faced the challenge of educating future strategic leaders on the subject of national security, or grand strategy...

  16. Guide to National Security Policy and Strategy

    Science.gov (United States)

    2006-06-01

    a part of contemporary post- structuralist and social constructivist approaches to international theory , often accompanied by quasi-indifference to...Richard Langhorne, The Practice of Diplomacy: Its Evolution, Theory , and Administration , London and New York: Routledge, 1995; David Jablonsky, Paradigm...61 II. Strategic Theory and Formulation

  17. Potential risks and threats to international security

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-12-01

    Full Text Available Today we can ascertain with certainty that in the early part of the 21st century, the challenges addressed to the current security environment tend to become increasingly diffuse, less predictable and multidimensional, being both a feature of external security, as well as an internal one and, of course, becoming an indispensable part of security policies and strategies. Therefore, the need for international cooperation as a foundation for the stability of the security environment has increased. It should provide a sense of trust and peace by ensuring the absence of danger both for the individual and for the community to which he belongs.

  18. Understanding the security situation in Colombia

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, C.O. [Colombia Central Bank (Colombia)

    1997-11-01

    The following aspects influencing Colombia are considered: the causes of security problems, including social, political and criminal violence; the political and economic crises produced by financing of the presidential campaign; coal`s social, economic and cultural environment in Guajira and Cesar; a description of the security situation in the carboniferous region focusing on guerrilla, crime and paramilitary threats; and three possible scenarios in the region`s security future. The government`s strategy of assuring restricted security to carboniferous and petroleum plants has proven expensive for the state and country. A competitive regional economy would bring social and economic benefits in the medium and long terms. 1 tab.

  19. Concepts and Practices of Cooperative Security

    DEFF Research Database (Denmark)

    Keating, Vincent; Wheeler, Nicholas J

    2013-01-01

    This chapter considers how the security dilemma can be overcome in ways that promote cooperation and even trust, mitigating or transcending the international uncertainty that can otherwise inhibit interstate cooperation. It argues that there are two mechanisms to create the trust necessary...... for the development of a security community, Charles Osgood's GRIT strategy and a unilateral 'leap of trust.' Both of these, however, initially require elites to develop security dilemma sensibility. The long-term stability of security communities is fundamentally linked to the presence of embedded trust among...

  20. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  1. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  2. Open source systems security certification

    CERN Document Server

    Damiani, Ernesto; El Ioini, Nabil

    2009-01-01

    Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems, including OSS, meet performance and security requirements as well as achieving the necessary certifications, according to the overall strategy of OSS usage on the part of the adopter

  3. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...... AFRICOM and US actions in Africa could be seen as a true (newfound) American interest in Africa or whether actions that are considered low-key and low-budget in Washington are to be regarded as a true asymmetry because African states regard US action as important and significant. The paper will explain...

  4. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  5. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    Science.gov (United States)

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  6. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  7. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  8. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  9. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  10. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  11. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  12. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  13. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    and a centre of service providers. Public support needs to be mobilized that nuclear power is safe with the necessary regulatory oversight and that the nuclear power is essential to meet their expectation of livelihoods and lifestyles at affordable costs. Thus a slew of short-term and long-term strategies are required to secure our country's energy future. (author)

  14. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  15. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  16. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  17. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  18. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  19. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  20. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  1. Households and food security: lessons from food secure households in East Africa.

    NARCIS (Netherlands)

    Silvestri, Silvia; Douxchamps, Sabine; Kristjanson, Patti; Förch, Wiebke; Radeny, Maren; Mutie, Lanetta; Quiros, F.C.; Herrero, M.; Ndungu, Anthony; Claessens, L.F.G.

    2015-01-01

    Background
    What are the key factors that contribute to household-level food security? What lessons can we learn from food secure households? What agricultural options and management strategies are likely to benefit female-headed households in particular? This paper addresses these questions

  2. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    Science.gov (United States)

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  3. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  4. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Gender, Conflict and Human Security in Nigeria: Challenges and ...

    African Journals Online (AJOL)

    ... buttress the inadequacies of human security in Nigeria; strategies were proffered to tackle these challenges. The paper concluded that once the strategies are critically looked into and steps are taken to implement them, certain prospects will accrue to gender human security network in Nigeria. Gender and Behaviour Vol.

  6. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  7. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  8. Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April

    OpenAIRE

    2006-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. April 2006. Welcome to the third edition of Homeland Securit...

  9. New computer security measures

    CERN Multimedia

    IT Department

    2008-01-01

    As a part of the long-term strategy to improve computer security at CERN, and especially given the attention focused to CERN by the start-up of the LHC, two additional security measures concerning DNS and Tor will shortly be introduced. These are described in the following texts and will affect only a small number of users. "PHISHING" ATTACKS CONTINUE CERN computer users continue to be subjected to attacks by people trying to infect our machines and obtain passwords and other confidential information by social engineering trickery. Recent examples include an e-mail message sent from "La Poste" entitled "Colis Postal" on 21 August, a fake mail sent from web and mail services on 8 September, and an e-mail purporting to come from Hallmark Cards announcing the arrival of an electronic postcard. However, there are many other examples and there are reports of compromised mail accounts being used for more realistic site-specific phishing attempts. Given the increased publicity rela...

  10. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of...sophisticated Marxist theories of conflict, the balance or “correlation” of forces: political and psy- chological force fields generated in peacetime or...wider political 18 and economic considerations, within hygienic, legally enforceable, Kantian “Euro Atlantic Security Struc- tures,” the Holy Grail

  11. Development Strategy for Slovak society

    International Nuclear Information System (INIS)

    Sikula, V.

    2010-01-01

    In this book authors analyse the present state of economy as well as strategy of perspectives of development of Slovak society. A key issue in the next 5 to 10 years in the energy sector will mainly address energy security, diversification of energy sources, renewable energy sources and energy savings. The strategic goal is to transform energy into a form that will ensure long competition-capable and reliable supply of all forms of energy, taking into account sustainable development, security of supply and technical security. The strategy of energy security of Slovakia in 2030 is to achieve a competitive energy industry, ensuring safe, reliable and efficient supply of all forms of energy at affordable prices with regard to consumer protection, environmental protection, sustainable development, security of supply and technical security.

  12. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  13. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  14. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  15. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  16. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  17. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  18. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  19. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  20. The liberalization of the European electric and gas industries through the firms' M and A and investment strategies: propositions for a better energy security; Le processus de liberalisation des industries electriques et gazieres europeennes a travers les strategies de fusion - acquisition et d'investissement des firmes - propositions pour une securite energetique renforcee

    Energy Technology Data Exchange (ETDEWEB)

    Benhassine, W.

    2009-04-15

    The electric and gas industries have been traditionally managed by public monopolies. The post World War II context was supportive to such an industrial organization. In fact, Europe was getting engaged in a long period of economic growth and was benefiting a favorable energetic context. At the end of the 90's, Europe decides to liberalize the national energy industries in order to create a unique European energy market. This liberalization has occurred in a context that as dramatically changed from the economic and energetic perspective. Indeed, the globalization phenomenon has strengthened the competitiveness of the emerging economies. The strong growth of the energy demand and the stagnation of the supply on the offer side have created tensions which have been increasingly frequent and important on the energy markets. Besides, facing greater budget restrictions and financial difficulties, the states have wished to get financially disengaged from these industries. Many factors show that the economic and energetic context will not get better in the next decades. Hence, in this new context, the liberalization of the energy industries should respond to two major stakes for the energy security of the European countries: the sustainability of the investments and the control of the energy demand. After having studied the merger and investment strategies of the energy firms, operating within a freshly liberalized sector, we make some propositions to draw up a new industrial organization which would allow a more efficient response to these two stakes. (author)

  1. Strategies for the prevention and mitigation of severe accidents

    International Nuclear Information System (INIS)

    Ader, C.; Heusener, G.; Snell, V.G.

    1999-01-01

    The currently operating nuclear power plants have, in general, achieved a high level of safety, as a result of design philosophies that have emphasized concepts such as defense-in-depth. This type of an approach has resulted in plants that have robust designs and strong containments. These designs were later found to have capabilities to protect the public from severe accidents (accidents more severe than traditional design basis in which substantial damage is done to the reactor core). In spite of this high level of safety, it has also been recognized that future plants need to be designed to achieve an enhanced level of safety, in particular with respect to severe accidents. This has led both regulatory authorities and utilities to develop guidance and/or requirements to guide plant designers in achieving improved severe accident performance through prevention and mitigation. The considerable research programs initiated after the TMI-2 accident have provided a large body of technical data, analytical methods, and the expertise necessary to provide for an understanding of a range of severe accident phenomena. This understanding of the ways severe accidents can progress and challenge containments, combined with the wide use of probabilistic safety assessments, have provided designers of evolutionary water cooled reactors opportunities to develop designs that minimize the challenges to the plant and to the public from severe accidents, including the development of accident management strategies intended to further reduce the risk of severe accidents. This paper describes some of the recent progress made in the understanding of severe accidents and related safety assessment methodology and how this knowledge has supported the incorporation of features into representative evolutionary designs that will prevent or mitigate many of the severe accident challenges present in current plants. (author)

  2. Strategy against hazardous environmental events

    International Nuclear Information System (INIS)

    Estefan, S.F.

    1992-01-01

    The major sources of waterways pollution in egypt have been assessed compact strategy is committed to promote sustainable development of our natural resources and to secure the safety of our environmental capital

  3. United States Strategy for Mexico

    National Research Council Canada - National Science Library

    Centner, Robert C

    2005-01-01

    The security and stability of Mexico is of national interest to the United States, and a strong, effective alliance between the two countries is pivotal to our national defense strategy and economic prosperity...

  4. Sustainable development strategy formation for business corporations

    Directory of Open Access Journals (Sweden)

    L. A. Zaporozhtseva

    2016-01-01

    Full Text Available The article explains the concept of the company sustainable development strategy based on its economic security level, which includes the economic security concept loss threat control; and the concept of company sustainable development based on the fact, that the company in a developed market should not only "defend", but also ensure its development. After it implementation of decomposition is applied to the system of strategic economic security through a balanced scorecard, which allows translating the mission and vision into a set of operational goals and targets. The main components of strategic economic security provision are: business processes, finance, contractors and staff; based on the state which economic security level is determined as: high, normal, low or critical. After that, the strategic prospects are set, i.e. transition from the lowest to the highest economic security level takes place, passing the economic security fields. In order to do this, certain company development strategy is selected, the mechanism for its implementation is being worked out. At the same time, company sustainable development strategy is identified in the case of a growth strategy use, which implies a transition from endogenous development strategy to introductive or introspective development strategy with further access to multi-integral development strategy. If there is inverse relationship, one can not speak of any sustainable development strategy. Besides, development, implementation and use of monitoring for the design process of the company's development strategy taking into account its economic security level acquires great importance.

  5. Significance of Hemispheric Security for Mexico

    Science.gov (United States)

    2003-04-07

    La Seguridad Internacional, la Nueva Geopolitica Continental y Mexico ,” Seminario Internacional sobre Misiones de Paz, Seguridad y Defensa, Rio de...USAWC STRATEGY RESEARCH PROJECT SIGNIFICANCE OF HEMISPHERIC SECURITY FOR MEXICO by LTC Enrique Garcia Jaramillo Cavalry, Mexican Army COL Joseph R...xx-xx-2002 to xx-xx-2003 4. TITLE AND SUBTITLE Significance of Hemispheric Security for Mexico Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  6. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  7. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  8. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  9. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  10. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  11. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  12. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  13. Building Defense-in-depth Architecture for Campus Networks%校园网络安全的深度防御策略与实现

    Institute of Scientific and Technical Information of China (English)

    郭伟; 余亚华

    2007-01-01

    随着校园网络的不断发展,传统的边界安全措施已无法抵御日趋复杂的网络拓扑和迅速增多的网络应用所带来的安全风险.在分析校园网络安全现状的基础上,提出利用不同网络层次的安全特性构建网络安全深度防御体系的策略,并对该体系的实现方法进行了探讨.

  14. Beyond defense-in-depth: cost and funding of state and local government radiological emergency response plans and preparedness in support of commercial nuclear power stations

    International Nuclear Information System (INIS)

    Salomon, S.N.

    1979-10-01

    Inadequate, sporadic, uncertain and frustrating are words local, state and Federal officials use to describe the current hodgepodge funding approach to State and local government radiological emergency response plans and preparedeness in support of commercial nuclear power stations. The creation of a Radiological Emergency Response Plans and Preparedness Fund for State and Local Government is offered as a preferred solution. Monies for the Fund could be derived from a one time Fee of $1 million levied on the operator of each nuclear power station. Every five years, adjustments could be made in the Fee to assure full recovery of costs because of inflation, revised criteria and other cost related factors. Any surplus would be refunded to the utilities. Any state that has obtained NRC concurrence or is in the process could be reimbursed for previous expenditures up to two years prior to NRC concurrence. Concurrence in all state and local government plans is the objective of the funding program. The Fund should be administered by the Nuclear Regulatory Commission. The report also discusses actions by Federal and state agencies and points to long range considerations, such as a training institute, including transportation and non-commercial and other fixed nuclear facilities, where preparedness could be enhanced by a coherent funding mechanism. All recommendations are based on an inquiry by the Office of state Programs, NRC, into the historical and future costs and funding of radiological emergency response plans and preparedness at the state and local government levels and are derived from discussions with many local, State and Federal officials

  15. Production sources and management of tritium generated by nuclear facilities. Works reporting from the reflection group 'tritium defense-in-depth'

    International Nuclear Information System (INIS)

    2001-01-01

    This report synthesizes current knowledge of tritium, its sources of tritium and its behavior in reactors and nuclear facilities. In addition, liquid and gaseous tritiated releases and the processes of separation and possible trapping of this radionuclide are displayed. This report also provides elements of reflection on the management of tritium produced today by these facilities, both in France and abroad. It presents insights on the relevance of current management modes of tritiated liquid and solid waste and also on the associated measures to reduce releases of tritium into the environment. (author)

  16. An approach based on defense-in-depth and diversity (3D) for the reliability assessment of digital instrument and control systems of nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Paulo Adriano da; Saldanha, Pedro L.C., E-mail: pasilva@cnen.gov.b, E-mail: Saldanha@cnen.gov.b [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Coord. Geral de Reatores Nucleares; Melo, Paulo F. Frutuoso e, E-mail: frutuoso@nuclear.ufrj.b [Universidade Federal do Rio de Janeiro (PEN/COPPE/UFRJ), RJ (Brazil). Coordenacao dos Programas de Pos-Graduacao em Engenharia. Programa de Engenharia Nuclear; Araujo, Ademir L. de [Associacao Brasileira de Ensino Universitario (UNIABEU), Angra dos Reis, RJ (Brazil)

    2011-07-01

    The adoption of instrumentation and control (I and C) digital technology has been slower in nuclear power plants. The reason has been unfruitful efforts to obtain evidence in order to prove that I and C systems can be used in nuclear safety systems, for example, the Reactor Protection System (RPS), ensuring the proper operation of all its functions. This technology offers a potential improvement for safety and reliability. However, there still no consensus about the model to be adopted for digital systems software to be used in reliability studies. This paper presents the 3D methodology approach to assess digital I and C reliability. It is based on the study of operational events occurring in NPPs. It is easy to identify, in general, the level of I and C system reliability, showing its key vulnerabilities, enabling to trace regulatory actions to minimize or avoid them. This approach makes it possible to identify the main types of digital I and C system failure, with the potential for common cause failures as well as evaluating the dominant failure modes. The MAFIC-D software was developed to assist the implementation of the relationships between the reliability criteria, the analysis of relationships and data collection. The results obtained through this tool proved to be satisfactory and complete the process of regulatory decision-making from licensing I and C digital of NPPs and call still be used to monitor the performance of I and C digital post-licensing during the lifetime of the system, providing the basis for the elaboration of checklists of regulatory inspections. (author)

  17. An approach based on defense-in-depth and diversity (3D) for the reliability assessment of digital instrument and control systems of nuclear power plants

    International Nuclear Information System (INIS)

    Silva, Paulo Adriano da; Saldanha, Pedro L.C.

    2011-01-01

    The adoption of instrumentation and control (I and C) digital technology has been slower in nuclear power plants. The reason has been unfruitful efforts to obtain evidence in order to prove that I and C systems can be used in nuclear safety systems, for example, the Reactor Protection System (RPS), ensuring the proper operation of all its functions. This technology offers a potential improvement for safety and reliability. However, there still no consensus about the model to be adopted for digital systems software to be used in reliability studies. This paper presents the 3D methodology approach to assess digital I and C reliability. It is based on the study of operational events occurring in NPPs. It is easy to identify, in general, the level of I and C system reliability, showing its key vulnerabilities, enabling to trace regulatory actions to minimize or avoid them. This approach makes it possible to identify the main types of digital I and C system failure, with the potential for common cause failures as well as evaluating the dominant failure modes. The MAFIC-D software was developed to assist the implementation of the relationships between the reliability criteria, the analysis of relationships and data collection. The results obtained through this tool proved to be satisfactory and complete the process of regulatory decision-making from licensing I and C digital of NPPs and call still be used to monitor the performance of I and C digital post-licensing during the lifetime of the system, providing the basis for the elaboration of checklists of regulatory inspections. (author)

  18. Defense-in-depth and diversity evaluation to cope with design bases events concurrent with common mode failure in digital plant protection system for KNGR

    International Nuclear Information System (INIS)

    Shin, Lee Cheol; Park, Chan Eok; Jin, Choi Chul; Tae, Seo Jong

    2001-01-01

    The Korean Next Generation Reactor (KNGR) has been evolved to adopt an advanced design feature, a digital Plant Protection System (PPS) as an effort of enhancing reliability and safety of the plant. Although the digital PPS can be designed with high reliability, it is considered to be vulnerable to the Common Mode Failure (CMF) in the system software resulting in a total loss of the built-in hardware redundancy. Therefore, a comprehensive evaluation has been performed to demonstrate the intrinsic capability of the KNGR design in coping with the design basis events concurrent with CMF in the digital PPS. Instead of the conservative bounding analysis methodology, a best-estimate analysis methodology has been developed and utilized since the design basis events accompanied by CMF in the digital PPS are categorized as beyond design bases events. A variety of diverse means such as Alternate Protection System (APS), process control systems, and timely operator actions have been verified to be effective in mitigating the design basis events with CMF in the digital PPS

  19. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  20. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  1. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  2. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  3. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  4. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  5. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  6. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  7. Security improvements for rail movements of SNM

    International Nuclear Information System (INIS)

    Garcia, M.R.; Gronager, J.E.; Shemigon, N.N.

    1998-01-01

    The US Department of Energy (DOE) and the Russian Special Scientific and Production State Enterprise Eleron have teamed to lead a project to enhance the overall security of Russian Ministry of Atomic Energy (MINATOM) transportation of Special Nuclear Material (SNM) shipments. The effort is called the Railcar Transportation Security Project and is part of the overall DOE Material Protection, Control, and Accounting (MPC and A) program addressing the enhancement of nuclear material control, accounting, and physical protection for Russian SNM. The goal of this MPC and A project is to significantly increase the security of Russian MINATOM highly enriched SNM rail shipments. To accomplish this, the MPC and A Railcar Transportation Security program will provide an enhanced, yet cost effective, railcar transportation security system. The system incorporates a balance between the traditional detection, communications, delay, and response security elements to significantly improve the security of MINATOM SNM shipments. The strategy of this program is to use rapid upgrades to implement mature security technologies as quickly as possible. The rapid upgrades emphasize rapidly deployable delay elements, enhanced radio communications, and intrusion detection and surveillance. Upgraded railcars have begun operation during FY98. Subsequent upgrades will build upon the rapid upgrades and eventually be integrated into a final deployed system configuration. This paper provides an overview of the program, with a summary of performance of the deployed railcars

  8. A Hierarchical Security Architecture for Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  9. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  10. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  11. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  12. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  13. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  14. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  15. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  16. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  17. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  18. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  19. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  20. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  1. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  2. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  3. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  4. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  5. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  6. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  7. Speaker's presentations. Energy supply security

    International Nuclear Information System (INIS)

    Pierret, Ch.

    2000-01-01

    This document is a collection of most of the papers used by the speakers of the European Seminar on Energy Supply Security organised in Paris (at the French Ministry of Economy, Finance and Industry) on 24 November 2000 by the General Direction of Energy and Raw Materials, in co-operation with the European Commission and the French Planning Office. About 250 attendees were present, including a lot of high level Civil Servants from the 15 European State members, and their questions have allowed to create a rich debate. It took place five days before the publication, on 29 November 2000, by the European Commission, of the Green Paper 'Towards a European Strategy for the Security of Energy Supply'. This French initiative, which took place within the framework of the European Presidency of the European Union, during the second half-year 2000. will bring a first impetus to the brainstorming launched by the Commission. (author)

  8. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  9. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  10. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  11. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  12. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  13. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  14. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  15. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  16. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  17. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  18. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  19. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  20. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.