WorldWideScience

Sample records for security zone potomac

  1. 75 FR 51945 - Safety Zone; Potomac River, St. Mary's River, St. Inigoes, MD

    Science.gov (United States)

    2010-08-24

    ...-AA00 Safety Zone; Potomac River, St. Mary's River, St. Inigoes, MD AGENCY: Coast Guard, DHS. ACTION... of the St. Mary's River, a tributary of the Potomac River. This action is necessary to provide for.... Navy helicopter located near St. Inigoes, Maryland. This safety zone is intended to protect the...

  2. 76 FR 63841 - Security Zone; Potomac River, Georgetown Channel, Washington, DC

    Science.gov (United States)

    2011-10-14

    ... effect from 6 a.m. until 6 p.m. on October 16, 2011. The security zone will include all navigable waters... security zone at the time it is in effect are to depart the zone immediately. To seek permission to transit... can better evaluate its effects on them and participate in the rulemaking process. Small businesses...

  3. 77 FR 42179 - Safety Zone; Fireworks Display, Potomac River, Charles County, Newburg, MD

    Science.gov (United States)

    2012-07-18

    ...]30[sec] W, located at Newburg in Charles County, Maryland (NAD 1983). The temporary safety zone will... 1625-AA00 Safety Zone; Fireworks Display, Potomac River, Charles County, Newburg, MD AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard will establish a safety zone upon...

  4. 75 FR 53574 - Safety Zone; Fireworks Displays, Potomac River, National Harbor, MD

    Science.gov (United States)

    2010-09-01

    ...-AA00 Safety Zone; Fireworks Displays, Potomac River, National Harbor, MD AGENCY: Coast Guard, DHS... safety of life on navigable waters during five fireworks displays launched from a discharge barge located... necessary to protect persons and vessels against the hazards associated with a fireworks display on...

  5. 76 FR 51255 - Security Zone; Potomac River, Georgetown Channel, Washington, DC

    Science.gov (United States)

    2011-08-18

    ... officials, mitigate potential terrorist acts, and enhance public and maritime safety and security. The Coast... officials, mitigating potential terrorist acts and enhancing public and maritime safety security. Under 5 U... and enhancing public and maritime safety and security. Background and Purpose The President of the...

  6. 75 FR 28757 - Security Zone; Potomac River, Washington Channel, Washington, DC

    Science.gov (United States)

    2010-05-24

    ... potential terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety... terrorist acts and enhancing public and maritime safety and security. Basis and Purpose The Coast Guard will...

  7. 77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC

    Science.gov (United States)

    2012-01-18

    ... terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to publish a... terrorist acts and enhancing public and maritime safety security. Under 5 U.S.C. 553(d)(3), the Coast Guard...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety...

  8. 76 FR 48751 - Security Zones; Captain of the Port Lake Michigan Zone

    Science.gov (United States)

    2011-08-09

    ... Jardine Water Filtration Plant security zone would encompass all U.S. navigable waters of Lake Michigan... areas near shore to Chicago's water filtration plants; the security zones have been designed to allow.... 165.910 Security Zones; Captain of the Port Lake Michigan. (a) * * * (1) Jardine Water Filtration...

  9. 75 FR 50700 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, and Drawbridge...

    Science.gov (United States)

    2010-08-17

    ...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, and Drawbridge Operation... notice lists temporary safety zones, security zones, special local regulations, and drawbridge operation... responsive to the safety and security needs within their jurisdiction; therefore, District Commanders and...

  10. 76 FR 70342 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-11-14

    ...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... published in the Federal Register. This notice lists temporary safety zones, security zones, special local... Commanders and Captains of the Port (COTP) must be immediately responsive to the safety and security needs...

  11. 77 FR 6007 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2012-02-07

    ...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... they could be published in the Federal Register. This notice lists temporary safety zones, security... the safety and security needs within their jurisdiction; therefore, District Commanders and COTPs have...

  12. 33 CFR 165.814 - Security Zones; Captain of the Port Houston-Galveston Zone.

    Science.gov (United States)

    2010-07-01

    ... Port Houston-Galveston Zone. 165.814 Section 165.814 Navigation and Navigable Waters COAST GUARD... § 165.814 Security Zones; Captain of the Port Houston-Galveston Zone. (a) Location. The following areas are designated as security zones: (1) Houston, Texas. The Houston Ship Channel and all associated...

  13. 33 CFR 165.169 - Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: New... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...

  14. 76 FR 70350 - West Oahu Offshore Security Zone

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1048] RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the navigable waters of Oahu's western...

  15. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu, HI...

  16. 77 FR 9528 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2012-02-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Waterway Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 17, 2012, through 11...

  17. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  18. 78 FR 54588 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6:00 a.m. on September 2, 2013 through 11:59 p.m...

  19. 78 FR 57485 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2013-09-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on September 12, 2013 through 11:59 p.m...

  20. 75 FR 18755 - Security Zone; Calcasieu River and Ship Channel, LA

    Science.gov (United States)

    2010-04-13

    ...The Coast Guard is disestablishing the permanent safety zone at Trunkline LNG in Lake Charles, LA and replacing it with a security zone with new boundaries. The Coast Guard is also establishing two additional permanent security zones on the waters of the Calcasieu River for the mooring basins at Cameron LNG in Hackberry, LA and PPG Industries in Lake Charles, LA. The Coast Guard is also disestablishing the Calcasieu River ship channel moving safety zone and replacing it with a moving security zone. The revised moving security zone extends channel edge to channel edge on the Calcasieu Channel and shoreline to shoreline on the Calcasieu River, 2 miles ahead and 1 mile astern of certain designated vessels while in transit on the Calcasieu Channel or Calcasieu River. Meeting, crossing or overtaking situations are not permitted within the security zone unless specifically authorized by the Captain of the Port. The moving security zone may commence at any point while certain vessels are transiting the Calcasieu Channel or Calcasieu River on U.S. territorial waters (12 nautical miles) in the Captain of the Port (COTP) Port Arthur zone. These security zones are needed to protect vessels, waterfront facilities, the public, and other surrounding areas from destruction, loss, or injury caused by sabotage, subversive acts, accidents, or other actions of a similar nature. Unless exempted under this rule, entry into or movement within these security zones is prohibited without permission from the Captain of the Port or a designated representative.

  1. 76 FR 3014 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2011-01-19

    ... Coast Guard will enforce the Blair Waterway security zone in Commencement Bay, WA for protection of... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0015] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS...

  2. 33 CFR 165.1409 - Security Zones; Hawaii, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...

  3. 76 FR 9646 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-22

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 100, 117, 147, and 165 [USCG-2010-0399] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation Regulations and Regulated Navigation Areas AGENCY: Coast Guard, DHS. ACTION: Notice of expired temporary rules...

  4. 33 CFR 165.154 - Safety and Security Zones: Long Island Sound Marine Inspection Zone and Captain of the Port Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: Long... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas First Coast Guard District § 165.154 Safety and Security Zones: Long Island Sound Marine...

  5. 33 CFR 165.1408 - Security Zones; Maui, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Maui, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1408 Security Zones; Maui, HI... Harbor, Maui, HI or within 3 nautical miles seaward of the Kahului Harbor COLREGS DEMARCATION (See 33 CFR...

  6. 78 FR 7265 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2013-02-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 1, 2013, through 11:59 p.m...

  7. 78 FR 11981 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2013-02-21

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 23, 2013, through 11:59 p.m...

  8. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  9. 33 CFR 165.500 - Safety/Security Zones; Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zones; Chesapeake... HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED ACCESS... Safety/Security Zones; Chesapeake Bay, Maryland. (a) Definitions. (1) Certain Dangerous Cargo (CDC) means...

  10. 33 CFR 165.503 - Security Zone; Captain of the Port Hampton Roads Zone.

    Science.gov (United States)

    2010-07-01

    ... Port Hampton Roads Zone. 165.503 Section 165.503 Navigation and Navigable Waters COAST GUARD... § 165.503 Security Zone; Captain of the Port Hampton Roads Zone. (a) Definitions. As used in this... been authorized by the Captain of the Port (COTP), Hampton Roads, Virginia to act on his or her behalf...

  11. 33 CFR 165.762 - Security Zone; St. Thomas, U.S. Virgin Islands.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; St. Thomas, U.S....762 Security Zone; St. Thomas, U.S. Virgin Islands. (a) Location. Moving and fixed security zones are established 50 yards around all cruise ships entering, departing, moored or anchored in the Port of St. Thomas...

  12. 33 CFR 165.1321 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Protection of... Areas Thirteenth Coast Guard District § 165.1321 Security Zone; Protection of Military Cargo, Captain of... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY...

  13. 76 FR 1521 - Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA

    Science.gov (United States)

    2011-01-11

    ...-AA87 Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA AGENCY: Coast Guard, DHS. ACTION... Diego, CA. The existing security zone is around the former Fleet Industrial Supply Center Pier. The security zone encompasses all navigable waters within 100 feet of the former Fleet Industrial Supply Center...

  14. 33 CFR 165.720 - Safety/Security Zone: St. Johns River, Jacksonville, FL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: St. Johns... OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED... § 165.720 Safety/Security Zone: St. Johns River, Jacksonville, FL. (a) Location. The water and the land...

  15. The Potomac Experience - a forerunner of DPS

    International Nuclear Information System (INIS)

    Steiner, R.C.

    1993-01-01

    Thirty years ago, dramatic events were about to begin in Potomac River basin with the publication of a report of study recommending 16 major reservoirs and hundreds of small ones to solve the foreseeable water supply problems in the basin, especially those of the Washington metropolitan area. The proposed solution was confounded by its shear size, the emergence of an era of more critical thinking, and the growing development of more sophisticated analytical tools. When viewed from the perspective of the current Drought Preparedness Studies, the Potomac Experience does seem in some senses to have been a forerunner. Among the greatest similarities is the simultaneous consideration of demands and resource availability on an operational time step with the aid of computer modelling. Other contributions to the success on the Potomac which are hoped to be included in the DPS include: involvement of local elected officials and citizens groups, technical input from the affected water utilities, creative use of analytical techniques, and the dedicated commitment of the project leadership

  16. 33 CFR 165.103 - Safety and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone...

    Science.gov (United States)

    2010-07-01

    ... within a 500-yard radius of any Liquefied Petroleum Gas (LPG) vessel while it is moored at the LPG... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; LPG... and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth...

  17. 76 FR 15214 - Special Local Regulations for Marine Events; Potomac River, Charles County, MD

    Science.gov (United States)

    2011-03-21

    ...-AA08 Special Local Regulations for Marine Events; Potomac River, Charles County, MD AGENCY: Coast Guard... for Marine Events; Potomac River, Charles County, MD'' in the Federal Register (76 FR 1381). We... follows: Sec. 100.35-T05-1113 Special Local Regulations for Marine Events; Potomac River, Charles County...

  18. 76 FR 1381 - Special Local Regulations for Marine Events; Potomac River, Charles County, MD

    Science.gov (United States)

    2011-01-10

    ...-AA08 Special Local Regulations for Marine Events; Potomac River, Charles County, MD AGENCY: Coast Guard... Regulations for Marine Events; Potomac River, Charles County, MD. (a) Regulated area. The following location... local regulations during the ``Potomac River Sharkfest Swim'' amateur swim, a marine event to be held on...

  19. Drainage areas of the Potomac River basin, West Virginia

    Science.gov (United States)

    Wiley, Jeffrey B.; Hunt, Michelle L.; Stewart, Donald K.

    1996-01-01

    This report contains data for 776 drainage-area divisions of the Potomac River Basin, from the headwaters to the confluence of the Potomac River and the Shenandoah River. Data, compiled in downstream order, are listed for streams with a drainage area of approximately 2 square miles or larger within West Virginia and for U.S. Geological Survey streamflow-gaging stations. The data presented are the stream name, the geographical limits in river miles, the latitude and longitude of the point, the name of the county, and the 7 1/2-minute quadrangle in which the point lies, and the drainage area of that site. The total drainage area of the Potomac River Basin downstream of the confluence of the Shenandoah River at the State boundary is 9,367.29 square miles.

  20. 77 FR 50926 - Security Zones; Certain Dangerous Cargo Vessels, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... (LPG), and ammonium nitrate. The security zones will start at buoys 3 and 4 in Tampa Bay ``F'' cut... propane gas, and ammonium nitrate. The security zones prohibit any vessel from entering within 500 yards.... We seek any comments or information that may lead to the discovery of a significant environmental...

  1. 33 CFR 165.1410 - Security Zones; Kauai, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Kauai, HI. 165..., HI. (a) Location. The following areas, from the surface of the water to the ocean floor, are security... Nawiliwili Harbor, Kauai, HI or within 3 nautical miles seaward of the Nawiliwili Harbor COLREGS DEMARCATION...

  2. 75 FR 20778 - Security Zone; Portland Rose Festival Fleet Week, Willamette River, Portland, OR

    Science.gov (United States)

    2010-04-21

    ...-AA87 Security Zone; Portland Rose Festival Fleet Week, Willamette River, Portland, OR AGENCY: Coast... during the Portland Rose Festival Fleet Week from June 2, 2010, through June 7, 2010. The security zone... is a need to provide a security zone for the 2010 Portland Rose Festival Fleet Week, and there is...

  3. 33 CFR 165.114 - Safety and Security Zones: Escorted Vessels-Boston Harbor, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.114 Safety and Security Zones: Escorted Vessels—Boston Harbor, Massachusetts. (a...

  4. 33 CFR 165.116 - Safety and Security Zones; Salem and Boston Harbors, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Salem..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED... § 165.116 Safety and Security Zones; Salem and Boston Harbors, Massachusetts. (a) Location. The...

  5. 75 FR 28202 - Security Zone; Escorted U.S. Navy Submarines in Sector Seattle Captain of the Port Zone

    Science.gov (United States)

    2010-05-20

    ... (1) the security zone is only in effect for the short periods of time when submarines are operating... impact on a substantial number of small entities because (1) the security zone is only in effect for the... its effects on them and participate in the rulemaking process. Small businesses may send comments on...

  6. 77 FR 75017 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2012-12-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2012-1038] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION... to read as follows: Sec. 165.T14-215 Security Zone; On the Waters in Kailua Bay, Oahu, HI. (a...

  7. 33 CFR 165.1312 - Security Zone; Portland Rose Festival on Willamette River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Portland Rose Festival on Willamette River. 165.1312 Section 165.1312 Navigation and Navigable Waters COAST GUARD... § 165.1312 Security Zone; Portland Rose Festival on Willamette River. (a) Location. The following area...

  8. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    OpenAIRE

    Portnoi, Marcos; Shen, Chien-Chung

    2014-01-01

    This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and securit...

  9. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Naval Amphibious Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a...

  10. 33 CFR 165.709 - Security Zone; Charleston Harbor, Cooper River, South Carolina.

    Science.gov (United States)

    2010-07-01

    ..., Cooper River, South Carolina. 165.709 Section 165.709 Navigation and Navigable Waters COAST GUARD... § 165.709 Security Zone; Charleston Harbor, Cooper River, South Carolina. (a) Regulated area. The Coast Guard is establishing a fixed security zone on all waters of the Cooper River, bank-to-bank and surface...

  11. 33 CFR 165.813 - Security Zones; Ports of Houston and Galveston, TX.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Ports of Houston... Security Zones; Ports of Houston and Galveston, TX. (a) Location. Within the Ports of Houston and Galveston... yards of a cruise ship unless expressly authorized by the Coast Guard Captain of the Port Houston...

  12. 77 FR 32898 - Safety & Security Zones; OPSAIL 2012 Connecticut, Thames River, New London, CT

    Science.gov (United States)

    2012-06-04

    ... 1625-AA00; AA87 Safety & Security Zones; OPSAIL 2012 Connecticut, Thames River, New London, CT AGENCY... 20, 2012 the Coast Guard published a notice of proposed rulemaking entitled Safety & Security Zones... Homeland Security Delegation No. 0170.1, which collectively authorize the Coast Guard to define safety and...

  13. 33 CFR 165.1190 - Security Zone; San Francisco Bay, Oakland Estuary, Alameda, CA.

    Science.gov (United States)

    2010-07-01

    ..., Oakland Estuary, Alameda, CA. 165.1190 Section 165.1190 Navigation and Navigable Waters COAST GUARD... § 165.1190 Security Zone; San Francisco Bay, Oakland Estuary, Alameda, CA. (a) Location. The following area is a security zone: All navigable waters of the Oakland Estuary, California, from the surface to...

  14. 75 FR 16370 - Regulated Navigation Areas, Safety Zones, Security Zones; Deepwater Ports in Boston Captain of...

    Science.gov (United States)

    2010-04-01

    ... rule under Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and would not create an environmental risk to...] RIN 1625-AA00, RIN 1625-AA11 Regulated Navigation Areas, Safety Zones, Security Zones; Deepwater Ports...

  15. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  16. 78 FR 79312 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2013-12-30

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2013-0934] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION..., Oahu, HI. (a) Location. The following area, within the COTP Honolulu Zone (see 33 CFR 3.70-10), from...

  17. 75 FR 8489 - Security Zone; Freeport Channel Entrance, Freeport, TX

    Science.gov (United States)

    2010-02-25

    ... environmental risk to health or risk to safety that may disproportionately affect children. Indian Tribal... Captain of the Port, Houston-Galveston deems enhanced security measures necessary on a case-by-case basis... vessels. The moving security zone may commence at any point after certain vessels bound for the Port of...

  18. 76 FR 12 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-01-03

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-1111] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., Oahu, HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3...

  19. 76 FR 80251 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-12-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1142] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3.70...

  20. 33 CFR 165.110 - Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone... Limited Access Areas First Coast Guard District § 165.110 Safety and Security Zone; Liquefied Natural Gas.... The following areas are safety and security zones: (1) Vessels underway. All navigable waters of the...

  1. 76 FR 63202 - Security Zones; Captain of the Port Lake Michigan Zone

    Science.gov (United States)

    2011-10-12

    ..., SE., Washington, DC 20590, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays... Filtration Plant security zone will encompass all U.S. navigable waters of Lake Michigan within an arc of a..., Illinois. It encompasses all U.S. navigable waters of Lake Michigan within the arc of a circle with a 100...

  2. 33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...

  3. 33 CFR 165.1121 - Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA.

    Science.gov (United States)

    2010-07-01

    ... Guard District § 165.1121 Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. (a... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. 165.1121 Section 165.1121 Navigation and Navigable Waters COAST...

  4. 33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.

    Science.gov (United States)

    2010-07-01

    ... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone...

  5. 33 CFR 165.731 - Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River Entrance Channel.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: Cumberland... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED... Seventh Coast Guard District § 165.731 Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River...

  6. 76 FR 63547 - Security Zone; Columbia and Willamette Rivers, Dredge Vessels Patriot and Liberty

    Science.gov (United States)

    2011-10-13

    ... or his designated representative. The security zone will be in effect while the Dredge Vessels are... its effects on them and participate in the rulemaking process. Small businesses may send comments on... requirements. (c) Enforcement period. The security zone created by this section will be in effect from 7 a.m...

  7. 76 FR 28315 - Security Zone; Portland Rose Festival on Willamette River

    Science.gov (United States)

    2011-05-17

    ... Zone; Portland Rose Festival on Willamette River AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY: The Coast Guard will enforce the Portland Rose Festival Security Zone in... River during the Portland Rose festival. During the enforcement period, no person or vessel may enter or...

  8. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  9. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... determination based on the fact that the security zones created by this rule will only be in effect during the... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2009-1134] RIN 1625...

  10. 77 FR 6708 - Special Local Regulations for Marine Events; Potomac River, Charles County, MD

    Science.gov (United States)

    2012-02-09

    ...-AA08 Special Local Regulations for Marine Events; Potomac River, Charles County, MD AGENCY: Coast Guard... River, Charles County, MD. (a) Regulated area. The following location is a regulated area: All waters of... local regulations during the ``Potomac River Sharkfest Swim'' amateur swim, a marine event to be held on...

  11. 33 CFR 165.835 - Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD... § 165.835 Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. (a) Definition. As used in...

  12. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters..., California. 165.1192 Section 165.1192 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport...

  13. 75 FR 18451 - Safety and Security Zones; Tall Ships Challenge 2010, Great Lakes; Cleveland, OH; Bay City, MI...

    Science.gov (United States)

    2010-04-12

    ...-AA87 Safety and Security Zones; Tall Ships Challenge 2010, Great Lakes; Cleveland, OH; Bay City, MI.... SUMMARY: The Coast Guard proposes to establish temporary safety and security zones around each Tall Ship visiting the Great Lakes during the Tall Ships Challenge 2010 race series. These safety and security zones...

  14. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... vessel SAFARI EXPLORER to its intended berth in the harbor. Entry into the temporary security zone is... operation of the SAFARI EXPLORER into Molokai has been voluntarily suspended by the operating company...

  15. 33 CFR 165.117 - Regulated Navigation Areas, Safety and Security Zones: Deepwater Ports, First Coast Guard District.

    Science.gov (United States)

    2010-07-01

    ..., Safety and Security Zones: Deepwater Ports, First Coast Guard District. 165.117 Section 165.117... Limited Access Areas First Coast Guard District § 165.117 Regulated Navigation Areas, Safety and Security... section are designated as regulated navigation areas. (2) Safety and security zones. All waters within a...

  16. 33 CFR 165.554 - Security Zone; Three Mile Island Generating Station, Susquehanna River, Dauphin County...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Three Mile Island... Areas Fifth Coast Guard District § 165.554 Security Zone; Three Mile Island Generating Station... waters of the Susquehanna River in the vicinity of the Three Mile Island Generating Station bounded by a...

  17. 33 CFR 165.502 - Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cove... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...

  18. 76 FR 22809 - Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA

    Science.gov (United States)

    2011-04-25

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0196] RIN 1625-AA00 Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA AGENCY... Security Exercise; San Francisco Bay, San Francisco, CA. (a) Location. The limits of this safety zone...

  19. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  20. Crossbedding of the Potomac Formation in Fairfax County, Virginia

    Science.gov (United States)

    Weir, Gordon Whitney

    1976-01-01

    Crossbedding in sandstone units is the most conspicuous sedimentary structure of the Potomac Formation in Fairfax County, Virginia. Most sets of crossbeds are a few feet thick and several feet wide and tens of feet long. Trough sets are dominant, but planar sets are also common. Dip directions of crossbeds show great variation, though westerly dips are sparse. The averages (resultant vectors) of crossbedding dip-directions measured at 33 localities do not show significant differences according to their geographic or stratigraphic distribution. The average dip-direction of the 292 crossbeds measured is N. 85? E. The data suggest that the depositional slope was easterly in Fairfax County throughout the time of deposition of the Potomac Formation. Major sand bodies, potential aquifers of the formation, are probably elongated along easterly trends.

  1. 33 CFR 165.1313 - Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1313 Security zone regulations, tank ship protection, Puget... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington 165.1313 Section 165.1313 Navigation and...

  2. 33 CFR 165.505 - Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake Bay, Calvert County, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake Bay, Calvert County, Maryland. 165.505 Section 165.505 Navigation and... Areas Fifth Coast Guard District § 165.505 Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake...

  3. 33 CFR 165.552 - Security Zone; Oyster Creek Generation Station, Forked River, Ocean County, New Jersey.

    Science.gov (United States)

    2010-07-01

    ... Generation Station, Forked River, Ocean County, New Jersey. 165.552 Section 165.552 Navigation and Navigable... Coast Guard District § 165.552 Security Zone; Oyster Creek Generation Station, Forked River, Ocean... part. (2) No person or vessel may enter or navigate within this security zone unless authorized to do...

  4. 33 CFR 165.776 - Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico 165.776 Section 165.776 Navigation and Navigable Waters COAST... Guard District § 165.776 Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico (a...

  5. 33 CFR 165.820 - Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania. 165.820 Section 165.820 Navigation and Navigable Waters... Guard District § 165.820 Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania. (a...

  6. Securing the Chernobyl exclusion zone against illegal movement of radioactive materials

    International Nuclear Information System (INIS)

    Bondarenko, O. O.; Proskura, M. I.; Duftschmid, K. E.; Kravchencko, N. E.

    2004-01-01

    . Within the framework of the IAEA Nuclear Security Program the technical cooperation project S trengthening Security of Nuclear Materials in Ukraine ( UKR/0/008) is aimed primarily to strengthen protection the entrance/exit checkpoints of the Chernobyl exclusion zone and adjacent State borders of Ukraine against illicit movement of radioactive materials (including nuclear materials). The particular situation of the exclusion zone presents a high risk of uncontrolled movement of radioactive materials from and into the exclusion zone. In view of the future construction of the S helter-2 a nd decommissioning of the three closed reactor blocks it is expected that the traffic through the exclusion zone will considerably increase in the next years and those large amounts of possibly contaminated metal scrap, construction material and equipment will leave the zone. There is also a risk of illegal movement of radioactive waste into the zone, possibly also through the international border, which could make the zone to an illegal dumping ground for radioactive waste. As practice shows theft of nuclear materials cannot be excluded. The general concept of the project is based on modernization of old and deployment of new vehicle (road and railway) and pedestrian monitoring equipment at all checkpoints of the exclusion zone including road checkpoints, train stations and river ports. A central station of data acquisition and management is to be located in Chernobyl. The equipment to be installed has to meet new technical requirements developed by IAEA. This includes, e.g. sensitivity of gamma and neutron detection, identification of innocent alarms caused by NORM materials or medical radioisotopes, accurate indication of the source position in the vehicle, and remote identification of license plate by advanced video systems. The implementation of the project and deployment of the equipment is expected to start in 2003 and should be completed in 2005. (Author)

  7. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  8. 33 CFR 165.1182 - Safety/Security Zone: San Francisco Bay, San Pablo Bay, Carquinez Strait, and Suisun Bay, CA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: San... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Eleventh Coast Guard District § 165.1182 Safety/Security Zone: San Francisco Bay, San Pablo Bay...

  9. Nuclear-weapon-free zones: Pursuing security, region by region. Conference of States Parties and Signatories of treaties that establish nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The development of nuclear-weapon-free zones, over the past four decades, is a testament to what nations can do, region by region, to achieve common security objectives. In fact, when considering the history of nuclear non-proliferation efforts, it might be said that here in Mexico City is w here it all began . The 1967 Treaty of Tlatelolco was the first multilateral treaty to establish a region free of nuclear weapons and a requirement for comprehensive IAEA safeguards for its parties - and clearly gave impetus to the conclusion of the Treaty on the Non-Proliferation of Nuclear Weapons. Nuclear-weapon-free zones provide tangible security benefits. They help to reassure the larger international community of the peaceful nuclear intentions of countries in these regions. They provide their members with security assurances against the use, or threat of use, of nuclear weapons by a nuclear-weapon State. They include control mechanisms for dealing with non-compliance in a regional setting. And in all cases, they prohibit the development, stationing or testing of nuclear weapons in their respective regions. An important benefit of these zones is that they open a forum for expanded regional dialogue on issues of security. Because the causes of insecurity vary from region to region, security solutions do not come in a 'one-size-fits-all' package. It is for this reason that regional dialogues, as we see in the nuclear-weapon-free zones, are so beneficial. It is clear that such treaties, and such security dialogues, would be invaluable in other areas of the world, such as the Middle East and the Korean Peninsula. Since the end of the Cold War, the international security landscape has undergone dramatic changes. For example, the rise in terrorism, the discovery of clandestine nuclear programmes, and the emergence of covert nuclear procurement networks have heightened our awareness of vulnerabilities in the nuclear non-proliferation regime. This statement focuses on two issues

  10. From headwaters to coast: Influence of human activities on water quality of the Potomac River Estuary

    Science.gov (United States)

    Bricker, Suzanne B.; Rice, Karen C.; Bricker, Owen P.

    2014-01-01

    The natural aging process of Chesapeake Bay and its tributary estuaries has been accelerated by human activities around the shoreline and within the watershed, increasing sediment and nutrient loads delivered to the bay. Riverine nutrients cause algal growth in the bay leading to reductions in light penetration with consequent declines in sea grass growth, smothering of bottom-dwelling organisms, and decreases in bottom-water dissolved oxygen as algal blooms decay. Historically, bay waters were filtered by oysters, but declines in oyster populations from overfishing and disease have led to higher concentrations of fine-sediment particles and phytoplankton in the water column. Assessments of water and biological resource quality in Chesapeake Bay and tributaries, such as the Potomac River, show a continual degraded state. In this paper, we pay tribute to Owen Bricker’s comprehensive, holistic scientific perspective using an approach that examines the connection between watershed and estuary. We evaluated nitrogen inputs from Potomac River headwaters, nutrient-related conditions within the estuary, and considered the use of shellfish aquaculture as an in-the-water nutrient management measure. Data from headwaters, nontidal, and estuarine portions of the Potomac River watershed and estuary were analyzed to examine the contribution from different parts of the watershed to total nitrogen loads to the estuary. An eutrophication model was applied to these data to evaluate eutrophication status and changes since the early 1990s and for comparison to regional and national conditions. A farm-scale aquaculture model was applied and results scaled to the estuary to determine the potential for shellfish (oyster) aquaculture to mediate eutrophication impacts. Results showed that (1) the contribution to nitrogen loads from headwater streams is small (about 2 %) of total inputs to the Potomac River Estuary; (2) eutrophic conditions in the Potomac River Estuary have improved in

  11. 33 CFR 165.1324 - Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington.

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1324 Safety and Security Zone; Cruise Ship Protection... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington. 165.1324 Section 165.1324 Navigation and...

  12. Mycobacterial infection in Northern snakehead (Channa argus) from the Potomac River catchment

    Science.gov (United States)

    Densmore, Christine L.; Iwanowicz, L.R.; Henderson, A.P.; Iwanowicz, D.D.; Odenkirk, J.S.

    2016-01-01

    The Northern snakehead, Channa argus (Cantor), is a non-native predatory fish that has become established regionally in some temperate freshwater habitats within the United States. Over the past decade, Northern snakehead populations have developed within aquatic ecosystems throughout the eastern USA, including the Potomac River system within Virginia, Maryland and Washington, D.C. Since this species was initially observed in this region in 2002, the population has expanded considerably (Odenkirk & Owens 2007). In the Chesapeake Bay watershed, populations of Northern snakehead exist in the lower Potomac River and Rappahannock Rivers on the Western shore of the Bay, and these fish have also been found in middle or upper reaches of river systems on the Eastern shore of the Bay, including the Nanticoke and Wicomico Rivers among others. Over the past several years, many aspects of Northern snakehead life history in the Potomac River have been described, including range and dispersal patterns, microhabitat selection and diet (Lapointe, Thorson & Angermeier 2010; Saylor, Lapointe & Angermeier 2012; Lapointe, Odenkirk & Angermeier 2013). However, comparatively little is known about their health status including susceptibility to parasitism and disease and their capacity to serve as reservoirs of disease for native wildlife. Although considered hardy by fisheries biologists, snakehead fish have demonstrated susceptibility to a number of described piscine diseases within their native range and habitat in Asia. Reported pathogens of significance in snakehead species in Asia include snakehead rhabdovirus (Lio-Po et al. 2000), aeromonad bacteria (Zheng, Cao & Yang 2012), Nocardia (Wang et al. 2007) andMycobacterium spp. (Chinabut, Limsuwan & Chantatchakool 1990; ). Mycobacterial isolates recovered from another snakehead species (Channa striata) in the previous studies have included M. marinum and M. fortuitum, as identified through molecular

  13. 33 CFR 165.553 - Security Zone; Salem and Hope Creek Generation Stations, Delaware River, Salem County, New Jersey.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Salem and Hope... Limited Access Areas Fifth Coast Guard District § 165.553 Security Zone; Salem and Hope Creek Generation...: the waters of the Delaware River in the vicinity of the Salem and Hope Creek Generation Stations...

  14. Development of Pipeline Database and CAD Model for Selection of Core Security Zone in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Choi, Seong Soo; Kwon, Tae Gyun; Baek, Hun Hyun; Kwon, Min Jin

    2008-07-01

    The objective of the project is to develop the pipeline database which can be used for selection of core security zones considering safety significance of pipes and to develop CAD model for 3-dimensional visualization of core security zones, for the purpose of minimizing damage and loss, enforcing security and protection on important facilities, and improving plant design preparing against emergency situations such as physical terrors in nuclear power plants. In this study, the pipeline database is developed for selection of core security zones considering safety significance of safety class 1 and 2 pipes. The database includes the information on 'pipe-room information-surrogate component' mapping, initiating events which may occur and accident mitigation functions which may be damaged by the pipe failure, and the drawing information related to 2,270 pipe segments of 30 systems. For the 3-dimensional visualization of core security zones, the CAD models on the containment building and the auxiliary building are developed using 3-D MAX tool and the demo program which can visualize the direct-X model converted from the 3-D MAX model is also developed. In addition to this, the coordinate information of all the buildings and their rooms is generated using AUTO CAD tool in order to be used as an input for 3-dimensional browsing of the VIP program

  15. 33 CFR 165.T09-0073 - Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes; Cleveland, OH; Bay City, MI...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Tall... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS... Guard District § 165.T09-0073 Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes...

  16. 77 FR 1723 - Notice of Availability, Potomac Heritage National Scenic Trail

    Science.gov (United States)

    2012-01-11

    ... Availability of a ``Foundation for Planning, Administration, Management and Interpretation of Potomac Heritage... the availability of a ``Foundation for Planning, Administration, Management and Interpretation of... planned Trail segments for non-motorized travel. Communities have invested in the Trail concept for a...

  17. 76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington

    Science.gov (United States)

    2011-07-11

    ... better evaluate its effects on them and participate in the rulemaking process. Small businesses may send... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] RIN 1625-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY...

  18. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-05-03

    ... reason: Vessel traffic can pass safely around the security zone. If you think that your business... its effects on them and participate in the rulemaking. If the rule would affect your small business... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625...

  19. Mathematical model simulation of a diesel spill in the Potomac River

    International Nuclear Information System (INIS)

    Feng, S.S.; Nicolette, J.P.; Markarian, R.K.

    1995-01-01

    A mathematical modeling technique was used to simulate the transport and fate of approximately 400,000 gallons of spilled diesel fuel and its impact on the aquatic biota in the Potomac River and Sugarland Run. Sugarland Run is a tributary about 21 miles upstream from Washington, DC. The mass balance model predicted the dynamic (spatial and temporal) distribution of spilled oil. The distributions were presented in terms of surface oil slick and sheen, dissolved and undissolved total petroleum hydrocarbons (TPH) in the water surface, water column, river sediments, shoreline and atmosphere. The processes simulated included advective movement, dispersion, dissolution, evaporation, volatilization, sedimentation, shoreline deposition, biodegradation, and removal of oil from cleanup operations. The model predicted that the spill resulted in a water column dissolved TPH concentration range of 0.05 to 18.6 ppm in Sugarland Run. The spilled oil traveled 10 miles along Sugarland Run before it reached the Potomac River. At the Potomac River, the water column TPH concentration was predicted to have decreased to the range of 0.0 to 0.43 ppm. These levels were consistent with field samples. To assess biological injury, the model used 4, 8, 24, 48, and 96-hr LC values in computing the fish injury caused by the fuel oil. The model used the maximum running average of dissolved TPH and exposure time to predict levels of fish mortality in the range of 38 to 40% in Sugarland Run. This prediction was consistent with field fisheries surveys. The model also computed the amount of spilled oil that adsorbed and settled into the river sediments

  20. 75 FR 53195 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-08-31

    ... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625-AA87 Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA AGENCY: Coast Guard, DHS. ACTION...

  1. Sediment distribution and hydrologic conditions of the Potomac aquifer in Virginia and parts of Maryland and North Carolina

    Science.gov (United States)

    McFarland, Randolph E.

    2013-01-01

    Sediments of the heavily used Potomac aquifer broadly contrast across major structural features of the Atlantic Coastal Plain Physiographic Province in eastern Virginia and adjacent parts of Maryland and North Carolina. Thicknesses and relative dominance of the highly interbedded fluvial sediments vary regionally. Vertical intervals in boreholes of coarse-grained sediment commonly targeted for completion of water-supply wells are thickest and most widespread across the central and southern parts of the Virginia Coastal Plain. Designated as the Norfolk arch depositional subarea, the entire sediment thickness here functions hydraulically as a single interconnected aquifer. By contrast, coarse-grained sediment intervals are thinner and less widespread across the northern part of the Virginia Coastal Plain and into southern Maryland, designated as the Salisbury embayment depositional subarea. Fine-grained intervals that are generally avoided for completion of water-supply wells are increasingly thick and widespread northward. Fine-grained intervals collectively as thick as several hundred feet comprise two continuous confining units that hydraulically separate three vertically spaced subaquifers. The subaquifers are continuous northward but merge southward into the single undivided Potomac aquifer. Lastly, far southeastern Virginia and northeastern North Carolina are designated as the Albemarle embayment depositional subarea, where both coarse- and fine-grained intervals are of only moderate thickness. The entire sediment thickness functions hydraulically as a single interconnected aquifer. A substantial hydrologic separation from overlying aquifers is imposed by the upper Cenomanian confining unit. Potomac aquifer sediments were deposited by a fluvial depositional complex spanning the Virginia Coastal Plain approximately 100 to 145 million years ago. Westward, persistently uplifted granite and gneiss source rocks sustained a supply of coarse-grained sand and gravel

  2. Cryptosporidium Source Tracking in the Potomac River Watershed▿

    OpenAIRE

    Yang, Wenli; Chen, Plato; Villegas, Eric N.; Landy, Ronald B.; Kanetsky, Charles; Cama, Vitaliano; Dearen, Theresa; Schultz, Cherie L.; Orndorff, Kenneth G.; Prelewicz, Gregory J.; Brown, Miranda H.; Young, Kim Roy; Xiao, Lihua

    2008-01-01

    To better characterize Cryptosporidium in the Potomac River watershed, a PCR-based genotyping tool was used to analyze 64 base flow and 28 storm flow samples from five sites in the watershed. These sites included two water treatment plant intakes, as well as three upstream sites, each associated with a different type of land use. The uses, including urban wastewater, agricultural (cattle) wastewater, and wildlife, posed different risks in terms of the potential contribution of Cryptosporidium...

  3. 76 FR 15216 - Security Zones; Cruise Ships, Port of San Diego, CA

    Science.gov (United States)

    2011-03-21

    ... Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and does not create an environmental risk to health or risk to...-AA87 Security Zones; Cruise Ships, Port of San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Final rule...

  4. 75 FR 27432 - Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA

    Science.gov (United States)

    2010-05-17

    ... can better evaluate its effects on them and participate in the rulemaking process. Small businesses... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0221] RIN 1625-AA87 Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA AGENCY...

  5. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  6. 77 FR 21448 - Security Zone; 2012 Fleet Week, Port Everglades, Fort Lauderdale, FL

    Science.gov (United States)

    2012-04-10

    ... Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and does not create an environmental risk to health or risk to safety that may disproportionately affect children...-AA87 Security Zone; 2012 Fleet Week, Port Everglades, Fort Lauderdale, FL AGENCY: Coast Guard, DHS...

  7. 76 FR 79536 - Security Zones; Captain of the Port Lake Michigan; Technical Amendment

    Science.gov (United States)

    2011-12-22

    ... Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and does not create an environmental risk to health or risk to safety that may disproportionately affect children...-AA87 Security Zones; Captain of the Port Lake Michigan; Technical Amendment AGENCY: Coast Guard, DHS...

  8. Quantifying the Consumptive Landscape in the Potomac Watershed Upstream From Washington DC

    Science.gov (United States)

    Kearns, M.; Zegre, N.; Fernandez, R.

    2017-12-01

    Some of the largest and fastest-growing eastern cities depend upon Appalachian headwaters for their fresh water. Today's relative abundance of water may be at risk: changes in climate and land use could alter the availability of surface water and human consumption could increase to meet the needs of a growing population and economy. Neither the supply of surface water nor the various withdrawals that support our population, irrigation, energy, and industry are distributed uniformly throughout our watersheds. This study correlates surface water withdrawals, consumptive use coefficients, and land-use/land-cover datasets to create a model for quantifying anthropogenic water consumption. The model suggests a method for downscaling and redistributing USGS county-level surface water withdrawals to 30 meter cells. Initially completed for the Potomac River watershed upstream from Washington DC's public supply intake, this approach could easily scale regionally or nationally. When combined with runoff estimates over the same landscape, the net-production or net-consumption of an area of interest may be calculated at high resolution. By better understanding the spatial relationship between hydrologic supply and demand, we can seek to improve the efficiency and security of our water resources.

  9. 76 FR 5732 - Security Zones; Cruise Ships, Port of San Diego, CA; Correction

    Science.gov (United States)

    2011-02-02

    ..., 2011. FOR FURTHER INFORMATION CONTACT: If you have questions on this document, call or e-mail Commander... [email protected] . If you have questions on viewing or submitting material to the docket, call... rule published in the Federal Register of January 27, 2011 (76 FR 4833), regarding security zones for...

  10. Life history and status of shortnose sturgeon (Acipenser brevirostrum) in the Potomac River

    Science.gov (United States)

    Kieffer, Micah

    2009-01-01

    We collected the first life history information on shortnose sturgeon (Acipenser brevirostrum) in any of the rivers to Chesapeake Bay, the geographic center of the species range. In the Potomac River, two telemetry-tagged adult females used 124 km of river: a saltwater/freshwater reach at river km (rkm) 63-141 was the foraging-wintering concentration area, and one female migrated to spawn at rkm 187 in Washington, DC. The spawning migration explained the life history context of an adult captured 122 years ago in Washington, DC, supporting the idea that a natal population once lived in the river. Repeated homing migrations to foraging and wintering areas suggested the adults were residents, not transient coastal migrants. All habitats that adults need to complete life history are present in the river. The Potomac River shortnose sturgeon offers a rare opportunity to learn about the natural rebuilding of a sturgeon population.

  11. 33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.

    Science.gov (United States)

    2010-07-01

    ... Guard District § 165.106 Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire. (a... property boundary of Seabrook Nuclear Power Plant identified as follows: beginning at position 42°53′58″ N, 070°51′06″ W then running along the property boundaries of Seabrook Nuclear Power Plant to position 42...

  12. 33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.

    Science.gov (United States)

    2010-07-01

    ... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position 35...

  13. 33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.

    Science.gov (United States)

    2010-07-01

    ... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...

  14. 76 FR 10524 - Restricted Area, Potomac River, Marine Corps Base Quantico, Quantico, VA

    Science.gov (United States)

    2011-02-25

    ..., in the third column, in Sec. 334.235, paragraph (b)(2), the sentence ``In addition, lighted, floating... the channel from the Potomac River and immediately west of the CSX railroad bridge.'' is corrected to read ``In addition, floating small craft intrusion barriers marked with reflective material will be...

  15. Behavior of medically-derived 131I in the tidal Potomac River

    International Nuclear Information System (INIS)

    Rose, Paula S.; Smith, Joseph P.; Cochran, J. Kirk; Aller, Robert C.; Swanson, R. Lawrence

    2013-01-01

    Iodine-131 (t 1/2 = 8.04 d) is administered to patients for treatment of thyroid disorders, excreted by patients and discharged to surface waters via sewage effluent. Radionuclides generally behave like their stable analogs; therefore, medically-derived 131 I is useful as a transport-reaction tracer of anthropogenic inputs and the aquatic biogeochemistry of iodine. Iodine-131 was measured in Potomac River water and sediments in the vicinity of the Blue Plains Water Pollution Control Plant (WPCP), Washington, DC, USA. Concentrations measured in sewage effluent from Blue Plains WPCP and in the Potomac River suggest a relatively continuous source of this radionuclide. The range of 131 I concentrations detected in surface water was 0.076 ± 0.006 to 6.07 ± 0.07 Bq L −1 . Iodine-131 concentrations in sediments ranged from 1.3 ± 0.8 to 117 ± 2 Bq kg −1 dry weight. Partitioning in the sewage effluent from Blue Plains and in surface waters indicated that 131 I is associated with colloidal and particulate organic material. The behavior of medically-derived 131 I in the Potomac River is consistent with the nutrient-like behavior of natural iodine in aquatic environments. After discharge to the river via sewage effluent, it is incorporated into biogenic particulate material and deposited in sediments. Solid phase sediment profiles of 131 I indicated rapid mixing or sedimentation of particulate debris and diagenetic remineralization and recycling on short time scales. - Highlights: ► Medically-derived 131 I was measured in sewage effluent, river water, and sediments. ► Sediment 210 Pb and 7 Be profiles help characterize the sedimentary environment. ► 131 I flux to sediments in study area is ∼ 1% of that discharged in sewage effluent. ► 131 I distributions constrain reaction-transport processes to weekly time scales. ► Collectively these data are used to better understand iodine biogeochemistry

  16. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ...-AA87 Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... temporary rule, call or email Lieutenant Junior Grade Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you...

  17. The distribution of submersed aquatic vegetation and water lettuce in the fresh and oligohaline tidal Potomac River, 2007

    Science.gov (United States)

    Campbell, Sarah Hunter; Rybicki, Nancy B.; Schenk, Edward R.

    2015-01-01

    Surveys documenting the composition of species of submersed aquatic vegetation (SAV) have been conducted in the Potomac River for decades. These surveys can help managers assess the proportion of native and exotic plants in the river or can be used to determine relationships between native and exotic plants, environmental conditions, and wildlife. SAV coverage increased from 2005 to 2007 throughout the fresh and oligohaline study area. The 2007 survey documented here determined that eleven species of SAV were present. The abundance of the exotic species Hydrilla verticillata (hydrilla) was relatively low, and species diversity was relatively high compared to previous years. The survey also revealed a new population of the invasive, floating aquatic plant Pistia stratiotes (water lettuce). In 2007, water lettuce, the latest exotic aquatic plant to be found in the fresh to oligohaline portion of the Potomac River, was most abundant in Mattawoman Creek, Charles County, Maryland. However, it was not observed in the fresh to oligohaline portion of the Potomac River in the summer of 2008. An understanding of the distribution of SAV species and factors governing the abundance of native and invasive aquatic species is enhanced by long-term surveys.

  18. Selected trace-element and organic contaminants in the streambed sediments of the Potomac River Basin, August 1992

    Science.gov (United States)

    Gerhart, James M.; Blomquist, Joel D.

    1995-01-01

    This report describes the occurrence and distribution of five selected contaminants in streambed sediments at 22 stream sites in the Potomac River Basin. Lead, mercury, and total DDT (dichlorodiphenyltrichloroethane) were detected at all sites, and chlordane and total PCB's (polychlorinated biphenyls) were detected at most sites. At six sites, streambed-sediment concentrations of contaminants were detected at levels with the potential to cause frequent adverse effects on aquatic organisms that live in the sediments. Chlordane was detected at these high levels at sampling sites on the Anacostia River, the North Branch Potomac River, Bull Run, and Accotink Creek; mercury was detected at these levels at sites on the South River and the South Fork Shenandoah River; and total PCB's were detected at these levels at the site on the South Fork Shenandoah River. The highest concentrations of all five contaminants generally occurred at sampling sites downstream from areas with industrial plants, urban centers, or orchard and agricultural activity. The occurrence of these contaminants in streambed sediments of the Potomac River Basin is of concern because the contaminants (1) are environmentally persistent, (2) are available for downstream transport during high streamflow periods, and (3) have the potential to cause adverse effects on the health of aquatic organisms and humans through bioaccumulation.

  19. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... channel's entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai... entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai Harbor...

  20. 33 CFR 165.1151 - Security Zones; liquefied hazardous gas tank vessels, San Pedro Bay, California.

    Science.gov (United States)

    2010-07-01

    ... a tank vessel as liquefied petroleum gas, liquefied natural gas, or similar liquefied gas products... Eleventh Coast Guard District § 165.1151 Security Zones; liquefied hazardous gas tank vessels, San Pedro... the sea floor, within a 500 yard radius around any liquefied hazardous gas (LHG) tank vessel that is...

  1. Reproductive endocrine disruption in smallmouth bass (Micropterus dolomieu) in the Potomac River basin: spatial and temporal comparisons of biological effects

    Science.gov (United States)

    Blazer, Vicki; Iwanowicz, Luke R.; Henderson, Holly; Mazik, Patricia M.; Jenkins, Jill A.; Alvarez, David A.; Young, John A.

    2012-01-01

    A high prevalence of intersex or testicular oocytes (TO) in male smallmouth bass within the Potomac River drainage has raised concerns as to the health of the river. Studies were conducted to document biomarker responses both temporally and spatially to better understand the influence of normal physiological cycles, as well as water quality and land-use influences. Smallmouth bass were collected over a 2-year period from three tributaries of the Potomac River: the Shenandoah River, the South Branch Potomac and Conococheague Creek, and an out-of-basin reference site on the Gauley River. The prevalence of TO varied seasonally with the lowest prevalence observed in July, post-spawn. Reproductive maturity and/or lack of spawning the previous spring, as well as land-use practices such as application of manure and pesticides, may influence the seasonal observations. Annual, seasonal, and site differences were also observed in the percentage of males with measurable concentrations of plasma vitellogenin, mean concentration of plasma vitellogenin in females, and plasma concentrations of 17β-estradiol and testosterone in both sexes. Bass collected in the South Branch Potomac (moderate to high prevalence of TO) had less sperm per testes mass with a lower percentage of those sperm being motile when compared to those from the Gauley River (low prevalence of TO). An inverse relationship was noted between TO severity and sperm motility. An association between TO severity and wastewater treatment plant flow, percent of agriculture, total number of animal feeding operations, the number of poultry houses, and animal density within the catchment was observed.

  2. Reproductive endocrine disruption in smallmouth bass (Micropterus dolomieu) in the Potomac River basin: spatial and temporal comparisons of biological effects.

    Science.gov (United States)

    Blazer, Vicki S; Iwanowicz, Luke R; Henderson, Holly; Mazik, Patricia M; Jenkins, Jill A; Alvarez, David A; Young, John A

    2012-07-01

    A high prevalence of intersex or testicular oocytes (TO) in male smallmouth bass within the Potomac River drainage has raised concerns as to the health of the river. Studies were conducted to document biomarker responses both temporally and spatially to better understand the influence of normal physiological cycles, as well as water quality and land-use influences. Smallmouth bass were collected over a 2-year period from three tributaries of the Potomac River: the Shenandoah River, the South Branch Potomac and Conococheague Creek, and an out-of-basin reference site on the Gauley River. The prevalence of TO varied seasonally with the lowest prevalence observed in July, post-spawn. Reproductive maturity and/or lack of spawning the previous spring, as well as land-use practices such as application of manure and pesticides, may influence the seasonal observations. Annual, seasonal, and site differences were also observed in the percentage of males with measurable concentrations of plasma vitellogenin, mean concentration of plasma vitellogenin in females, and plasma concentrations of 17β-estradiol and testosterone in both sexes. Bass collected in the South Branch Potomac (moderate to high prevalence of TO) had less sperm per testes mass with a lower percentage of those sperm being motile when compared to those from the Gauley River (low prevalence of TO). An inverse relationship was noted between TO severity and sperm motility. An association between TO severity and wastewater treatment plant flow, percent of agriculture, total number of animal feeding operations, the number of poultry houses, and animal density within the catchment was observed.

  3. Secure Mix-Zones for Privacy Protection of Road Network Location Based Services Users

    Directory of Open Access Journals (Sweden)

    Rubina S. Zuberi

    2016-01-01

    Full Text Available Privacy has been found to be the major impediment and hence the area to be worked out for the provision of Location Based Services in the wide sense. With the emergence of smart, easily portable, communicating devices, information acquisition is achieving new domains. The work presented here is an extension of the ongoing work towards achieving privacy for the present day emerging communication techniques. This work emphasizes one of the most effective real-time privacy enhancement techniques called Mix-Zones. In this paper, we have presented a model of a secure road network with Mix-Zones getting activated on the basis of spatial as well as temporal factors. The temporal factors are ascertained by the amount of traffic and its flow. The paper also discusses the importance of the number of Mix-Zones a user traverses and their mixing effectiveness. We have also shown here using our simulations which are required for the real-time treatment of the problem that the proposed transient Mix-Zones are part of a viable and robust solution towards the road network privacy protection of the communicating moving objects of the present scenario.

  4. 77 FR 50929 - Security Zones; 2012 RNC Bridge Security Zones, Captain of the Port St. Petersburg Zone, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... Convention have conducted threat, vulnerability, and risk analyses relating to the event. The convention is... mitigate the threats and vulnerabilities identified in the analysis discussed above. Security measures have... maritime stakeholders, including recreational boaters, from threats and security vulnerabilities. The Coast...

  5. Patterns of Diel Variation in Nitrate Concentrations in the Potomac River

    Science.gov (United States)

    Burns, D. A.; Miller, M. P.; Pellerin, B. A.; Capel, P. D.

    2015-12-01

    The Potomac River is the second largest source of nitrogen to Chesapeake Bay, where reducing nutrient loads has been a focus of efforts to improve estuarine trophic status. Two years of high frequency sensor measurements of nitrate (NO3-) concentrations in the Upper Potomac River at the Little Falls gage were analyzed to quantify seasonal variation in the magnitude and timing of the apparent loss of NO3- from the water column that results from diel-driven processes. In addition to broad seasonal and flow-driven variation in NO3- concentrations, clear diel patterns were evident in the river, especially during low flow conditions that follow stormflow by several days. Diel variation was about 0.01 mg N/L in winter and 0.02 to 0.03 mg N/L in summer with intermediate values during spring and fall. This variation was equivalent to 10% occurred during some summer days. Maximum diel concentrations occurred during mid- to late-morning in most seasons, with the most repeatable patterns in summer and wider variation in timing during fall and winter. Diel NO3- loss diminished loads by about 0.6% in winter and 1.3% in summer, and diel-driven processes were minor compared to estimates of total in-stream NO3- loss that averaged about one-third of the inferred groundwater NO3- contribution to the river network. The magnitude of diel NO3- variation was more strongly related to metrics based on water temperature and discharge than to metrics based on photosynthetically active radiation. Despite the fairly low diminishment of NO3- loads attributable to diel variation, estimates of diel NO3- uptake were fairly high compared to published values from smaller streams and rivers. The diel NO3- patterns observed in the Potomac River are consistent with photosynthesis of periphyton as a principal driver which may be linked to denitrification through the release of labile carbon. The extent to which these diel patterns are related to measures of aquatic metabolism are unknown as is the role

  6. Reproductive health of bass in the Potomac, U.S.A., drainage: part 1. Exploring the effects of proximity to wastewater treatment plant discharge.

    Science.gov (United States)

    Iwanowicz, Luke R; Blazer, Vicki S; Guy, Christopher P; Pinkney, Alfred E; Mullican, John E; Alvarez, David A

    2009-05-01

    Intersex (specifically, testicular oocytes) has been observed in male smallmouth bass (SMB; Micropterus dolomieu) and other centrarchids in the South Branch of the Potomac River, U.S.A., and forks of the Shenandoah River, U.S.A., during the past five years. This condition often is associated with exposure to estrogenic endocrine-disrupting chemicals in some fish species, but such chemicals and their sources have yet to be identified in the Potomac. In an attempt to better understand the plausible causes of this condition, we investigated the reproductive health of bass sampled up- and downstream of wastewater treatment plant (WWTP) effluent point sources on the Potomac River in Maryland, U.S.A. Smallmouth bass were sampled from the Conococheague Creek and the Monocacy River, and largemouth bass (LMB; Micropterus salmoides) were collected near the Blue Plains WWTP on the mainstem of the Potomac River. Chemical analyses of compounds captured in passive samplers at these locations also were conducted. A high prevalence of intersex (82-100%) was identified in male SMB at all sites regardless of collection area. A lower prevalence of intersex (23%) was identified in male LMB collected at the Blue Plains site. When up- and downstream fish were compared, significant differences were noted only in fish from the Conococheague. Differences included condition factor, gonadosomatic index, plasma vitellogenin concentration, and estrogen to testosterone ratio. In general, chemicals associated with wastewater effluent, storm-water runoff, and agriculture were more prevalent at the downstream sampling sites. An exception was atrazine and its associated metabolites, which were present in greater concentrations at the upstream sites. It appears that proximity to effluent from WWTPs may influence the reproductive health of bass in the Potomac watershed, but inputs from other sources likely contribute to the widespread, high incidence of testicular oocytes.

  7. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ...-AA87 Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... (NCSM 710) which include all waters within 100 yards from the vessels while underway in the Puget Sound... authorized by the COTP, Puget Sound or Designated Representative. DATES: This rule is effective from 8 a.m...

  8. 77 FR 10960 - Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY

    Science.gov (United States)

    2012-02-24

    ...'' W (Port Morris Stacks), and all waters of the Bronx Kill southeast of the Bronx Kill Rail Road...-AA87 Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY AGENCY: Coast Guard, DHS... waters of the East River and Bronx Kill, in the vicinity of Randalls and Wards Islands, New York. This...

  9. 77 FR 55777 - Security Zones; Dignitary Arrival/Departure and United Nations Meetings, New York, NY

    Science.gov (United States)

    2012-09-11

    ... (Port Morris Stacks), and all waters of the Bronx Kill southeast of the Bronx Kill Rail Road Bridge... a permanent security zone on the waters of the East River and Bronx Kill, in the vicinity of... portion of the East River and Bronx Kill when public officials are scheduled to arrive and depart the area...

  10. 75 FR 29695 - Security Zones; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX

    Science.gov (United States)

    2010-05-27

    ... rule under Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and would not create an environmental risk to... proposes to establish moving security zones for certain vessels for which the Captain of the Port, Port...

  11. Individual growth and reproductive behavior in a newly established population of northern snakehead (Channa argus), Potomac River, USA

    Science.gov (United States)

    Landis, Andrew M. Gascho; Lapointe, Nicolas W. R.; Angermeier, Paul L.

    2010-01-01

    Northern snakehead (Channa argus) were first found in the Potomac River in 2004. In 2007, we documented feeding and reproductive behavior to better understand how this species is performing in this novel environment. From April to October, we used electrofishing surveys to collect data on growth, condition, and gonad weight of adult fish. Growth rates of young were measured on a daily basis for several weeks. Mean length-at-age for Potomac River northern snakehead was lower than for fish from China, Russia, and Uzbekistan. Fish condition was above average during spring and fall, but below average in summer. Below-average condition corresponded to periods of high spawning activity. Gonadosomatic index indicated that females began spawning at the end of April and continued through August. Peak spawning occurred at the beginning of June when average temperatures reached 26°C. Larval fish growth rate, after the transition to exogenous feeding, was 2.3 (SD ± 0.7) mm (total length, TL) per day. Although Potomac River northern snakehead exhibited lower overall growth rates when compared to other populations, these fish demonstrated plasticity in timing of reproduction and rapid larval growth rates. Such life history characteristics likely contribute to the success of northern snakehead in its new environment and limit managers’ options for significant control of its invasion.

  12. 77 FR 19963 - Special Local Regulation and Security Zone: War of 1812 Bicentennial Commemoration, Port of...

    Science.gov (United States)

    2012-04-03

    ... National Technology Transfer and Advancement Act (NTTAA) (15 U.S.C. 272 note) directs agencies to use...] RIN 1625-AA00; 1625-AA08 Special Local Regulation and Security Zone: War of 1812 Bicentennial..., and after the War of 1812 Bicentennial Commemoration events in the Port of Boston, Massachusetts, to...

  13. The Transformation of the Army of the Potomac Staff from 1862 to 1864

    Science.gov (United States)

    2014-05-22

    calculated using the work of William Fox in 1889, Thomas Livermore in 1909, and John Bigelow’s analysis in 1910. Castel and Simpson; and Ernest B...from France and Britain .146 Lee intended to aggressively push north, across the Potomac River, and into Pennsylvania to gain the...Ingalls as chief quartermaster, and Henry J. Hunt as the army’s artillery chief. Hunt continuously reorganized and refitted the artillery corps, which was

  14. 76 FR 1065 - Security Zone; 23rd Annual North American International Auto Show, Detroit River, Detroit, MI

    Science.gov (United States)

    2011-01-07

    ...-AA87 Security Zone; 23rd Annual North American International Auto Show, Detroit River, Detroit, MI... officials at the 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in... 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in downtown Detroit...

  15. 77 FR 76411 - Security Zone; 25th Annual North American International Auto Show, Detroit River, Detroit, MI

    Science.gov (United States)

    2012-12-28

    ...-AA87 Security Zone; 25th Annual North American International Auto Show, Detroit River, Detroit, MI..., visitors, and public officials at the 25th Annual North American International Auto Show (NAIAS), which is... Purpose The 25th Annual North American International Auto Show (NAIAS) will be held at Cobo Hall in...

  16. 77 FR 2453 - Security Zone; 24th Annual North American International Auto Show, Detroit River, Detroit, MI

    Science.gov (United States)

    2012-01-18

    ...-AA87 Security Zone; 24th Annual North American International Auto Show, Detroit River, Detroit, MI..., visitors, and public officials at the 24th Annual North American International Auto Show (NAIAS), which is... The 24th Annual North American International Auto Show (NAIAS) will be held at Cobo Hall in downtown...

  17. 77 FR 6954 - Special Local Regulations; Safety and Security Zones; Recurring Events in Captain of the Port...

    Science.gov (United States)

    2012-02-10

    ... necessary security zone, and (3) updating and reorganizing existing regulations for ease of use and... provide the event name, and type, as well as locations of the events. Annual notifications will be made to..., before the effective period, the Coast Guard will issue notice of the time and location of each regulated...

  18. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  19. Remote sensing of coal mine pollution in the upper Potomac River basin

    Science.gov (United States)

    1974-01-01

    A survey of remote sensing data pertinent to locating and monitoring sources of pollution resulting from surface and shaft mining operations was conducted in order to determine the various methods by which ERTS and aircraft remote sensing data can be used as a replacement for, or a supplement to traditional methods of monitoring coal mine pollution of the upper Potomac Basin. The gathering and analysis of representative samples of the raw and processed data obtained during the survey are described, along with plans to demonstrate and optimize the data collection processes.

  20. Striped bass ichthyoplankton abundance, mortality, and production estimation for the Potomac River population

    International Nuclear Information System (INIS)

    Polgar, T.T.

    1977-01-01

    Methods are developed for estimating, from field survey data, the mortality rate and production for each successive ichthyoplanktonic stage. The abundance estimators used in the computation of these quantities are also derived. An age-dependent, ichthyoplankton population model is developed assuming either a uniform age distribution or an exponential age distribution within each stage. Striped bass egg and larval data from a 1974 ichthyoplankton survey in the Potomac River are used in model computations. The various model estimates are evaluated qualitatively, and the usefulness and limitations of the models are discussed

  1. 33 CFR 165.1187 - Security Zones; Golden Gate Bridge and the San Francisco-Oakland Bay Bridge, San Francisco Bay...

    Science.gov (United States)

    2010-07-01

    ... Limited Access Areas Eleventh Coast Guard District § 165.1187 Security Zones; Golden Gate Bridge and the... Golden Gate Bridge and the San Francisco-Oakland Bay Bridge, in San Francisco Bay, California. (b... siren, radio, flashing light, or other means, the operator of a vessel shall proceed as directed. [COTP...

  2. 76 FR 44803 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-07-27

    ... USCG-2009-1081 New Orleans, LA Safety Zone (Part 165)..... 12/23/2009 USCG-2009-1084 Rio Vista, CA...-1096 Port Portland Zone......... Safety Zone (Part 165)..... 7/3/2010 USCG-2009-0040 La Push, WA Safety...-0950 Madisonville, LA Safety Zone (Part 165)..... 12/31/2009 USCG-2009-0951 Lower Mississippi River...

  3. A water-quality study of the tidal Potomac River and Estuary: An overview

    Science.gov (United States)

    Callendar, Edward; Carter, Virginia; Hahl, D.C.; Hitt, Kerie; Schultz, Barbara I.

    1984-01-01

    The U.S. Geological Survey began a 5-year interdisciplinary study of the tidal Potomac River and Estuary in October of 1977. The objectives of the study are: (1) to provide a basic understanding of physical, chemical, and biological processes; (2) to develop flow and transport models to predict the movement and fate of nutrients and algaes and (3) to develop efficient techniques for the study of tidal rivers and estuaries. The ultimate goal is to aid water-quality decision-making for the tidal Potomac River and Estuary. The study is being conducted by scientists from many disciplines involved in 14 interrelated studies. These scientists are addressing five major problem areas: nutrient enrichment, algal blooms, dissolved oxygen, sedimentation, and effects of water quality on living resources. Preliminary results show that treatment of sewage has reduced the concentration load of organic carbon and phosphorus below that of the 1960's and 1970's, and changed the form of dissolved nitrogen in the tidal river. Concentrations of chlorophyll a during the study period were lower than those experienced during the massive algal blooms of the 1960's. Dissolved oxygen concentrations fluctuate in response to changes in algal populations, but remain above the Environmental Protection Agency limits during the summer low-flow period. Sedimentation rates have accelerated during the past 50-70 years due to urbanization and farming. Asian clams have recently invaded the tidal river; submersed aquatic vegetation has declined since the early 1900's, but conditions may now favor its return.

  4. 33 CFR 165.812 - Security Zones; Lower Mississippi River, Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans...

    Science.gov (United States)

    2010-07-01

    ... River, Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans, LA. 165.812 Section 165.812 Navigation..., Southwest Pass Sea Buoy to Mile Marker 96.0, New Orleans, LA. (a) Location. Within the Lower Mississippi... Lower Mississippi River mile marker 96.0 in New Orleans, Louisiana. These moving security zones...

  5. Nitrogen dynamics in the tidal freshwater Potomac River, Maryland and Virginia, water years 1979-81: A water-quality study of the tidal Potomac River and estuary

    International Nuclear Information System (INIS)

    Shutz, D.J.

    1989-01-01

    On an annual basis, river supplied nitrate is the predominant form of N supplied to the tidal Potomac River from external sources. Much of the nitrate is associated with high flows that have rapid transit times through the tidal river. After the fall of 1980, initiation of advanced wastewater treatment at the Blue Plains Sewage Treatment Plant (STPP) reduced ammonia loading to the river by 90% and increased nitrate loading by a similar percentage. As a result, concentrations of ammonia during the 1981 low flow period were 1.50 mg/L as N. Despite the reduced availability of ammonia, 15-N uptake studies showed that phytoplankton preferred ammonia to nitrate unless ammonia concentrations were < 0.10 mg/L as N. Nitrification studies during 1981 using a 14-C uptake technique indicate that rates did not vary with sample location, except for one sample from the head of the tidal river, where the rates were much higher. Process models were used in conjunction with mass-balance determinations and individual process studies to estimate rates of processes that were not directly measured. It is estimated that denitrification removed 10 times as much nitrate from the water column during the summer of 1981 as during the summer of 1980. Sedimentation of particulate N is estimated to be the largest sink for N from the water column and was approximately equal to the external annual loading of all N constituents on a daily basis. In summer, when river flows usually are low, the tidal Potomac River appears to be a partially closed system rather than one dominated by transport. Nitrogen constituents, primarily from point sources, are taken up by phytoplankton converted to organic matter, and sedimented from the water column. Some of this N eventually becomes available again by means of benthic exchange. Removal, by transport, out of the tidal river is significant only during winter. 70 refs., 20 figs., 10 tabs

  6. 15 CFR 400.41 - Zone operations; general.

    Science.gov (United States)

    2010-01-01

    ... district and is responsible for enforcement, including physical security and access requirements, as... operation. Zone grantees shall ensure that the reasonable zone needs of the business community are served by...

  7. Intersex (testicular oocytes) in smallmouth bass from the Potomac River and selected nearby drainages.

    Science.gov (United States)

    Blazer, V S; Iwanowicz, L R; Iwanowicz, D D; Smith, D R; Young, J A; Hedrick, J D; Foster, S W; Reeser, S J

    2007-12-01

    Intersex, or the presence of characteristics of both sexes, in fishes that are normally gonochoristic has been used as an indicator of exposure to estrogenic compounds. In 2003, during health assessments conducted in response to kills and a high prevalence of skin lesions observed in smallmouth bass Micropterus dolomieu in the South Branch of the Potomac River, the presence of immature oocytes within testes was noted. To evaluate this condition, a severity index (0-4) was developed based on the distribution of oocytes within the testes. Using gonad samples collected from 2003 to 2005, the number of histologic sections needed to accurately detect the condition in mature smallmouth bass was statistically evaluated. The reliability of detection depended on the severity index and the number of sections examined. Examining five transverse sections taken along the length of the gonad resulted in a greater than 90% probability of detecting testicular oocytes when the severity index exceeded 0.5. Using the severity index we compared smallmouth bass collected at selected sites within the South Branch during three seasons in 2004. Seasonal differences in severity and prevalence were observed. The highest prevalence and severity were consistently noted during the prespawn-spawning season, when compared with the postspawn season. In 2005, smallmouth bass were collected at selected out-of-basin sites in West Virginia where fish kills and external skin lesions have not been reported, as well as at sites in the Shenandoah River, Virginia (part of the Potomac drainage), where kills and lesions occurred in 2004-2005. The prevalence of testicular oocytes is discussed in terms of human population and agricultural intensity.

  8. Food Vulnerability and Alluvial Farming for Food Security in Central Dry Zone Area of Myanmar

    Science.gov (United States)

    Boori, M. S.; Choudhary, K.; Evers, M.; Kupriyanov, A.

    2017-10-01

    The central dry zone area of Myanmar is the most water stressed and also one of the most food insecure regions in the country. In the Dry Zone area, the total population is 10.1 million people in 54 townships, in which approximately 43 % live in below poverty line and 40-50 % of the rural population is landless. Agriculture is the most important economic sector in Myanmar as it is essential for national food security and a major source of livelihood for its people. In this region the adverse effects of climate change such as late or early onset of monsoon season, longer dry spells, erratic rainfall, increasing temperature, heavy rains, stronger typhoons, extreme spatial-temporal variability of rainfall, high intensities, limited rainfall events in the growing season, heat stress, drought, flooding, sea water intrusion, land degradation, desertification, deforestation and other natural disasters are believed to be a major constraint to food insecurity. For food vulnerability, we use following indicators: slope, precipitation, vegetation, soil, erosion, land degradation and harvest failure in ArcGIS software. The erosion is influenced by rainfall and slope, while land degradation is directly related to vegetation, drainage and soil. While harvest failure can be generate by rainfall and flood potential zones. Results show that around 45 % study area comes under very high erosion danger level, 70 % under average harvest failure, 59 % intermediate land degradation area and the overall around 45 % study area comes under insecure food vulnerability zone. Our analysis shows an increase in alluvial farming by 1745.33 km2 since 1988 to reduce the insecure food vulnerability. Food vulnerability map is also relevant to increased population and low income areas. The extreme climatic events are likely increase in frequency and magnitude of serious drought periods and extreme floods. Food insecurity is an important thing that must be reviewed because it relates to

  9. FOOD VULNERABILITY AND ALLUVIAL FARMING FOR FOOD SECURITY IN CENTRAL DRY ZONE AREA OF MYANMAR

    Directory of Open Access Journals (Sweden)

    M. S. Boori

    2017-10-01

    Full Text Available The central dry zone area of Myanmar is the most water stressed and also one of the most food insecure regions in the country. In the Dry Zone area, the total population is 10.1 million people in 54 townships, in which approximately 43 % live in below poverty line and 40–50 % of the rural population is landless. Agriculture is the most important economic sector in Myanmar as it is essential for national food security and a major source of livelihood for its people. In this region the adverse effects of climate change such as late or early onset of monsoon season, longer dry spells, erratic rainfall, increasing temperature, heavy rains, stronger typhoons, extreme spatial-temporal variability of rainfall, high intensities, limited rainfall events in the growing season, heat stress, drought, flooding, sea water intrusion, land degradation, desertification, deforestation and other natural disasters are believed to be a major constraint to food insecurity. For food vulnerability, we use following indicators: slope, precipitation, vegetation, soil, erosion, land degradation and harvest failure in ArcGIS software. The erosion is influenced by rainfall and slope, while land degradation is directly related to vegetation, drainage and soil. While harvest failure can be generate by rainfall and flood potential zones. Results show that around 45 % study area comes under very high erosion danger level, 70 % under average harvest failure, 59 % intermediate land degradation area and the overall around 45 % study area comes under insecure food vulnerability zone. Our analysis shows an increase in alluvial farming by 1745.33 km2 since 1988 to reduce the insecure food vulnerability. Food vulnerability map is also relevant to increased population and low income areas. The extreme climatic events are likely increase in frequency and magnitude of serious drought periods and extreme floods. Food insecurity is an important thing that must be reviewed

  10. Rates and probable causes of freshwater tidal marsh failure, Potomac River Estuary, Northern Virginia, USA

    Science.gov (United States)

    Litwin, Ronald J.; Smoot, Joseph P.; Pavich, Milan J.; Markewich, Helaine Walsh; Oberg, Erik T.; Steury, Brent W.; Helwig, Ben; Santucci, Vincent L.; Sanders, Geoffrey

    2013-01-01

    Dyke Marsh, a distal tidal marsh along the Potomac River estuary, is diminishing rapidly in areal extent. This study documents Dyke Marsh erosion rates from the early-1860s to the present during pre-mining, mining, and post-mining phases. From the late-1930s to the mid-1970s, Dyke Marsh and the adjacent shallow riverbottom were mined for gravel, resulting in a ~55 % initial loss of area. Marsh loss continued during the post-mining phase (1976–2012). Causes of post-mining loss were unknown, but were thought to include Potomac River flooding. Post-mining areal-erosion rates increased from 0.138 ha yr−1 (~0.37 ac yr−1) to 0.516 ha yr−1(~1.67 ac yr−1), and shoreline-erosion rates increased from 0.76 m yr−1 (~2.5 ft yr−1) to 2.60 m yr−1 (~8.5 ft yr−1). Results suggest the accelerating post-mining erosion reflects a process-driven feedback loop, enabled by the marsh's severely-altered geomorphic and hydrologic baseline system; the primary post-mining degradation process is wave-induced erosion from northbound cyclonic storms. Dyke Marsh erosion rates are now comparable to, or exceed, rates for proximal coastal marshes in the same region. Persistent and accelerated erosion of marshland long after cessation of mining illustrates the long-term, and potentially devastating, effects that temporally-restricted, anthropogenic destabilization can have on estuarine marsh systems.

  11. Organic Compounds in Potomac River Water Used for Public Supply near Washington, D.C., 2003-05

    Science.gov (United States)

    Brayton, Michael J.; Denver, Judith M.; Delzer, Gregory C.; Hamilton, Pixie A.

    2008-01-01

    Organic compounds studied in this U.S. Geological Survey (USGS) assessment generally are man-made, including, in part, pesticides, solvents, gasoline hydrocarbons, personal care and domestic-use products, and refrigerants and propellants. A total of 85 of 277 compounds were detected at least once among the 25 samples collected approximately monthly during 2003-05 at the intake of the Washington Aqueduct, one of several community water systems on the Potomac River upstream from Washington, D.C. The diversity of compounds detected indicate a variety of different sources and uses (including wastewater discharge, industrial, agricultural, domestic, and others) and different pathways (including treated wastewater outfalls located upstream, overland runoff, and ground-water discharge) to drinking-water supplies. Seven compounds were detected year-round in source-water intake samples, including selected herbicide compounds commonly used in the Potomac River Basin and in other agricultural areas across the United States. Two-thirds of the 26 compounds detected most commonly in source water (in at least 20 percent of the samples) also were detected most commonly in finished water (after treatment but prior to distribution). Concentrations for all detected compounds in source and finished water generally were less than 0.1 microgram per liter and always less than human-health benchmarks, which are available for about one-half of the detected compounds. On the basis of this screening-level assessment, adverse effects to human health are expected to be negligible (subject to limitations of available human-health benchmarks).

  12. Securing information display by use of visual cryptography.

    Science.gov (United States)

    Yamamoto, Hirotsugu; Hayasaki, Yoshio; Nishida, Nobuo

    2003-09-01

    We propose a secure display technique based on visual cryptography. The proposed technique ensures the security of visual information. The display employs a decoding mask based on visual cryptography. Without the decoding mask, the displayed information cannot be viewed. The viewing zone is limited by the decoding mask so that only one person can view the information. We have developed a set of encryption codes to maintain the designed viewing zone and have demonstrated a display that provides a limited viewing zone.

  13. 76 FR 7107 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-09

    ... defined boundary for which regulations for vessels navigating within the area have been established by the...)...... 9/19/2008 USCG-2008-0814 San Diego, CA Safety Zones (Part 165)...... 9/6/2008 USCG-2008-0827 Ocean... (Part 165). USCG-2009-0402 Ocean City, NJ Safety Zones (Part 165)...... 10/10/2009 USCG-2009-0403...

  14. Climate, Clams, and a Changing Watershed: A time series analysis to quantify the impact of management and climate on water quality in the Potomac Estuary

    Science.gov (United States)

    The Potomac River is the largest tributary of the Chesapeake Bay and has been a key study site in water quality research, beginning with work to address public health concerns such as safe drinking water and waterborne disease during periods of population growth and urbanization ...

  15. 33 CFR 147.801 - Boxer Platform safety zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Boxer Platform safety zone. 147.801 Section 147.801 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OUTER CONTINENTAL SHELF ACTIVITIES SAFETY ZONES § 147.801 Boxer Platform safety zone. (a...

  16. Mortality of centrarchid fishes in the Potomac drainage: survey results and overview of potential contributing factors.

    Science.gov (United States)

    Blazer, V S; Iwanowicz, L R; Starliper, C E; Iwanowicz, D D; Barbash, P; Hedrick, J D; Reeser, S J; Mullican, J E; Zaugg, S D; Burkhardt, M R; Kelble, J

    2010-09-01

    Skin lesions and spring mortality events of smallmouth bass Micropterus dolomieu and selected other species were first noted in the South Branch of the Potomac River in 2002. Since that year morbidity and mortality have also been observed in the Shenandoah and Monocacy rivers. Despite much research, no single pathogen, parasite, or chemical cause for the lesions and mortality has been identified. Numerous parasites, most commonly trematode metacercariae and myxozoans; the bacterial pathogens Aeromonas hydrophila, Aeromonas salmonicida, and Flavobacterium columnare; and largemouth bass virus have all been observed. None have been consistently isolated or observed at all sites, however, nor has any consistent microscopic pathology of the lesions been observed. A variety of histological changes associated with exposure to environmental contaminants or stressors, including intersex (testicular oocytes), high numbers of macrophage aggregates, oxidative damage, gill lesions, and epidermal papillomas, were observed. The findings indicate that selected sensitive species may be stressed by multiple factors and constantly close to the threshold between a sustainable (healthy) and nonsustainable (unhealthy) condition. Fish health is often used as an indicator of aquatic ecosystem health, and these findings raise concerns about environmental degradation within the Potomac River drainage. Unfortunately, while much information has been gained from the studies conducted to date, due to the multiple state jurisdictions involved, competing interests, and other issues, there has been no coordinated approach to identifying and mitigating the stressors. This synthesis emphasizes the need for multiyear, interdisciplinary, integrative research to identify the underlying stressors and possible management actions to enhance ecosystem health.

  17. Computer security of NPP instrumentation and control systems: categorization

    International Nuclear Information System (INIS)

    Klevtsov, A.L.; Simonov, A.A.; Trubchaninov, S.A.

    2016-01-01

    The paper is devoted to studying categorization of NPP instrumentation and control (I&C) systems from the point of view of computer security and to consideration of the computer security levels and zones used by the International Atomic Energy Agency (IAEA). The paper also describes the computer security degrees and zones regulated by the International Electrotechnical Commission (IEC) standard. The computer security categorization of the systems used by the U.S. Nuclear Regulatory Commission (NRC) is presented. The experts analyzed the main differences in I&C systems computer security categorization accepted by the IAEA, IEC and U.S. NRC. The approaches to categorization that should be advisably used in Ukraine during the development of regulation on NPP I&C systems computer security are proposed in the paper

  18. Successes of Restoration and Its Effect on the Fish Community in a Freshwater Tidal Embayment of the Potomac River, USA

    Directory of Open Access Journals (Sweden)

    Kim de Mutsert

    2017-06-01

    Full Text Available After a local wastewater treatment plant significantly reduced phosphorus loading into a phytoplankton-dominated tributary of the Potomac River in the early 1980s, water quality and biological communities were monitored bi-weekly from April to September. After a 10-year time-lag, submerged aquatic vegetation (SAV, once abundant in this freshwater tidal embayment, returned to the area in 1993. After additional reductions in nitrogen load starting in 2000, the system switched to an SAV-dominated state in 2005. Fish abundance did not change during these distinct phase changes, but the fish community structure did. Increases in SAV provided refuge and additional spawning substrate for species with adhesive eggs such as Banded Killifish (Fundulus diaphanus, which is now the most abundant species in the embayment. Other changes observed were a decrease in the relative contribution of open water dwelling species such as White Perch (Morone americana, and an increase of visual predators such as Largemouth Bass (Micropterus salmoides. The 30-year record of data from this Potomac River tributary has revealed important long-term trends that validate the effectiveness of initiatives to reduce excess nutrient inputs, and will aid in the continued management of the watershed and point-source inputs.

  19. Determinants of Household Food Security in Drought Prone Areas of ...

    African Journals Online (AJOL)

    This paper documents the determinants of household-level food security based on the data collected in 2003 from 954 randomly-selected households in major drought-prone areas of Ethiopia; namely from the West and East Haraghe zones of Oromiya and South Gonder zone of Amhara. The food security is assessed using ...

  20. 77 FR 36394 - Safety Zone for Fireworks Display, Potomac River, National Harbor Access Channel; Oxon Hill, MD

    Science.gov (United States)

    2012-06-19

    ... to coordinate protest activities so that your message can be received without jeopardizing the safety or security of people, places or vessels. 7. Unfunded Mandates Reform Act The Unfunded Mandates..., adjacent to the Gaylord National Resort Hotel, at Oxon Hill in Prince Georges County, Maryland scheduled on...

  1. Cryptosporidium Source Tracking in the Potomac River Watershed▿

    Science.gov (United States)

    Yang, Wenli; Chen, Plato; Villegas, Eric N.; Landy, Ronald B.; Kanetsky, Charles; Cama, Vitaliano; Dearen, Theresa; Schultz, Cherie L.; Orndorff, Kenneth G.; Prelewicz, Gregory J.; Brown, Miranda H.; Young, Kim Roy; Xiao, Lihua

    2008-01-01

    To better characterize Cryptosporidium in the Potomac River watershed, a PCR-based genotyping tool was used to analyze 64 base flow and 28 storm flow samples from five sites in the watershed. These sites included two water treatment plant intakes, as well as three upstream sites, each associated with a different type of land use. The uses, including urban wastewater, agricultural (cattle) wastewater, and wildlife, posed different risks in terms of the potential contribution of Cryptosporidium oocysts to the source water. Cryptosporidium was detected in 27 base flow water samples and 23 storm flow water samples. The most frequently detected species was C. andersoni (detected in 41 samples), while 14 other species or genotypes, almost all wildlife associated, were occasionally detected. The two common human-pathogenic species, C. hominis and C. parvum, were not detected. Although C. andersoni was common at all four sites influenced by agriculture, it was largely absent at the urban wastewater site. There were very few positive samples as determined by Environmental Protection Agency method 1623 at any site; only 8 of 90 samples analyzed (9%) were positive for Cryptosporidium as determined by microscopy. The genotyping results suggest that many of the Cryptosporidium oocysts in the water treatment plant source waters were from old calves and adult cattle and might not pose a significant risk to human health. PMID:18776033

  2. Impact of Banking Information Systems Security on Banking in China: The Case of Large State-Owned Banks in Shenzhen Economic Special Zone — An Introduction

    OpenAIRE

    Keith L. Hood; Jie-Wen Yang

    1998-01-01

    This paper focuses on information security in Chinese Banking Information Systems (BIS), which can only be understood in the context of the wider reforms of the Chinese banking sector. A small pilot study of banking in Shenzhen was carried out. Shenzhen, in southern China, is one of the Economic Special Zones and may be considered as being at the leading edge of development in banking and a pointer towards future developments of banking in China. Information security was found to be inadequat...

  3. Chemical contaminants in water and sediment near fish nesting sites in the Potomac River basin: determining potential exposures to smallmouth bass (Micropterus dolomieu).

    Science.gov (United States)

    Kolpin, Dana W; Blazer, Vicki S; Gray, James L; Focazio, Michael J; Young, John A; Alvarez, David A; Iwanowicz, Luke R; Foreman, William T; Furlong, Edward T; Speiran, Gary K; Zaugg, Steven D; Hubbard, Laura E; Meyer, Michael T; Sandstrom, Mark W; Barber, Larry B

    2013-01-15

    The Potomac River basin is an area where a high prevalence of abnormalities such as testicular oocytes (TO), skin lesions, and mortality has been observed in smallmouth bass (SMB, Micropterus dolomieu). Previous research documented a variety of chemicals in regional streams, implicating chemical exposure as one plausible explanation for these biological effects. Six stream sites in the Potomac basin (and one out-of-basin reference site) were sampled to provide an assessment of chemicals in these streams. Potential early life-stage exposure to chemicals detected was assessed by collecting samples in and around SMB nesting areas. Target chemicals included those known to be associated with important agricultural and municipal wastewater sources in the Potomac basin. The prevalence and severity of TO in SMB were also measured to determine potential relations between chemistry and biological effects. A total of 39 chemicals were detected at least once in the discrete-water samples, with atrazine, caffeine, deethylatrazine, simazine, and iso-chlorotetracycline being most frequently detected. Of the most frequently detected chemicals, only caffeine was detected in water from the reference site. No biogenic hormones/sterols were detected in the discrete-water samples. In contrast, 100 chemicals (including six biogenic hormones/sterols) were found in a least one passive-water sample, with 25 being detected at all such samples. In addition, 46 chemicals (including seven biogenic hormones/sterols) were found in the bed-sediment samples, with caffeine, cholesterol, indole, para-cresol, and sitosterol detected in all such samples. The number of herbicides detected in discrete-water samples per site had a significant positive relation to TO(rank) (a nonparametric indicator of TO), with significant positive relations between TO(rank) and atrazine concentrations in discrete-water samples and to total hormone/sterol concentration in bed-sediment samples. Such significant

  4. 19 CFR 146.23 - Accountability for merchandise in a zone.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Accountability for merchandise in a zone. 146.23 Section 146.23 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY....23 Accountability for merchandise in a zone. (a) Identification of merchandise—(1) General. A zone...

  5. Managing the Civil-Military Relationship: A Study of Lincoln’s Management of the Army of the Potomac Within the Context of Mission Command

    Science.gov (United States)

    2017-06-09

    is intended to inform the relationship provided for in the Constitution between the politician and the military advisor . The fruitfulness of...leading up to his inauguration. Lincoln’s personal correspondence following his nomination to the Republican ticket smoothed egos, and cajoled his...the political appointments Lincoln made to the Armies of the Potomac and the West. As early as his nomination to the Republican presidential candidacy

  6. Diet of non-native northern snakehead (Channa argus) compared to three co-occurring predators in the lower Potomac River, USA

    Science.gov (United States)

    Ryan K. Saylor,; Nicolas W.R. Laointe,; Angermeier, Paul

    2012-01-01

    Introductions of large, non-native, carnivorous fishes continue to occur worldwide and represent a substantial management concern to global biodiversity. One of the most recent non-native fishes to successfully establish in North America is the northern snakehead (Channa argus), found in the lower Potomac River catchment. Dispersal of the northern snakehead throughout this system has been well documented since its original discovery in May 2004; however, little is known about the foraging habits of this species and its interactions with co-occurring predators. Here, we quantify northern snakehead diet in comparison with the diets of naturalised largemouth bass (Micropterus salmoides), and native American eel (Anguilla rostrata) and yellow perch (Perca flavescens) collected from tidal freshwaters bordering Virginia and Maryland near Fort Belvoir, Virginia. Over 97% of northern snakehead gut contents were fishes, with fundulid and centrarchid species consumed most frequently. Dietary overlap was biologically significant only between northern snakehead and largemouth bass. Aquatic invertebrates were >10 times more common in native predator diets, reducing dietary overlap with northern snakehead. Ontogenic shifts in adult northern snakehead diet were also detected, which may be explained by optimal foraging rather than true prey specificity. Northern snakehead may be occupying a novel niche based on a piscivorous diet, therefore limiting competition with resident predators in the lower Potomac River. Further research into interactions between largemouth bass and northern snakehead is needed to inform management decisions and understand the ecological impacts of this non-native species.

  7. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  8. WVSAMB Color Digital Orthophotos North Zone

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Digital color orthophotography of the State of West Virginia (West Virginia State Plane Coordinate System North Zone). The W.V. state plane system has two...

  9. Security in the Asia-Pacific region. Report on working group 5

    International Nuclear Information System (INIS)

    1997-01-01

    Security in the Asia-Pacific region is highly dependent on nuclear weapons-proliferation which can be achieved in two steps: non-introduction of nuclear weapons by nuclear powers, and creation of nuclear-weapon-free zone. The causes and steps towards arms build-up in the region are discussed. On of the indispensable factors in improving the relations between the countries in the zone is creation of confidence building measures and a security forum

  10. Prevalence of Anguillicoloides crassus and growth variation in migrant yellow-phase American eels of the upper Potomac River drainage

    Science.gov (United States)

    Zimmerman, Jennifer L.; Welsh, Stuart A.

    2012-01-01

    Prevalence of the non-native swim bladder nematode Anguillicoloides crassus has recently increased in American eels from estuaries of the North American Atlantic coast, but little is known about parasite prevalence or conditions of previous infection in upstream migrant eels within upper watersheds. This study is the first to confirm presence of A. crassus in the upper Potomac River watershed. We estimated A. crassus prevalence during 3 time periods: September to October 2006 (5/143 eels, 3.5%), August to October 2007 (0/49 eels), and June 2008 (0/50 eels). All eels were sampled from the Millville Dam eel ladder on the lower Shenandoah River, a Potomac River tributary located approximately 285 km upstream of Chesapeake Bay, USA. Of the 5 infected eels, parasite intensity was 1 for each eel, and mean intensity was also 1.0. A swim bladder degenerative index (SDI) was calculated for the 50 eels from the final sampling period, and 38% of those eels (19 of 50) showed signs of previous infection by A. crassus. We also aged 42 of the 50 eels (mean ± SE = 6.7 ± 0.29 yr, range 4 to 11 yr) from the final sampling period. Based on the range of possible SDI scores (0 to 6), severity of previously infected swim bladders was moderate (SDI = 1 or 2). Previously infected eels, however, had a lower length-at-age than that of uninfected eels. Female yellow-phase eels in upper watersheds develop into large highly fecund silver-phase adults; hence, a parasite-induced effect on growth of yellow-phase eels could ultimately reduce reproductive potential.

  11. Loads of suspended sediment and nutrients from local nonpoint sources to the tidal Potomac River and Estuary, Maryland and Virginia, 1979-81 water years

    Science.gov (United States)

    Hickman, R. Edward

    1987-01-01

    Loads of suspended sediment, phosphorus, nitrogen, biochemical oxygen demand, and dissolved silica discharged to the tidal Potomac River and Estuary during the !979-81 water years from three local nonpoint sources have been calculated. The loads in rain falling directly upon the tidal water surface and from overflows of the combined sewer system of the District of Columbia were determined from available information. Loads of materials in the streamflow from local watersheds draining directly to the tidal Potomac River and Estuary downstream from Chain Bridge in Washington, D.C., were calculated from samples of streamflow leaving five monitored watersheds. Average annual yields of substances leaving three urban watersheds (Rock Creek and the Northwest and Northeast Branches of the Anacostia River) and the rural Saint Clements Creek watershed were calculated either by developing relationships between concentration and streamflow or by using the mean of measured concentrations. Yields calculated for the 1979-81 water years are up to 2.3 times period-of-record yields because of greater than average streamflow and stormflow during this 3-year period. Period-of-record yields of suspended sediment from the three urban watersheds and the Saint Clements Creek watershed do not agree with yields reported by other studies. The yields from the urban watersheds are 17 to 51 percent of yields calculated using sediment-concentration data collected during the 1960-62 water years. Previous studies suggest that this decrease is at least partly due to the imposition of effective sediment controls at construction sites and to the construction of two multipurpose reservoirs. The yield calculated for the rural Saint Clements Creek watershed is at least twice the yields calculated for other rural watersheds, a result that may be due to most of the samples of this stream being taken during the summer of the 1981 water year, a very dry period. Loads discharged from all local tributary

  12. Introduction: Geomorphic studies of the storm and flood of November 3-5, 1985, in the upper Potomac and Cheat River basins: Chapter A in Geomorphic studies of the storm and flood of November 3-5, 1985, in the upper Potomac and Cheat River basins in West Virginia and Virginia

    Science.gov (United States)

    Jacobson, Robert B.

    1993-01-01

    The heavy rains of November 3-5, 1985, produced record floods and extensive landsliding in the Potomac and Cheat River basins in West Virginia and Virginia (pl. 1). Although rainfall intensity was moderate, the storm covered a very large area and produced record floods for basins in the size range of 1000-10,000 km2. In addition, thousands of landslides were triggered on slopes underlain by shale bedrock. The total social cost of the storm amounted to 70 lives lost and an estimated $1.3 billion in damage to homes, businesses, roads, and productive land in West Virginia and Virginia (Federal Emergency Management Agency (FEMA) 1985a, b). These extreme costs were incurred despite the fact that the affected area is sparsely populated. To understand the origins and geomorphic effects of the 1985 storm, studies were undertaken by the U.S. Geological Survey, University of Maryland, West Virginia University, Cornell University, University of Virginia, The Johns Hopkins University, and Carleton College. Personnel were also consulted from the National Weather Service, Nuclear Regulatory Commission, U.S. Army Corps of Engineers, Soil Conservation Service, and Interstate Commission on the Potomac River basin. This cooperative effort serves to document the effects of the storm as an example of an extreme geomorphic event in the central Appalachian Mountains. The following chapters comprise observations and preliminary analyses for some of the observed phenomena. Subsequent publications by the contributors to this volume will expand the scope of this research.

  13. 78 FR 35801 - Safety and Security Zones, San Juan Captain of the Port Zone

    Science.gov (United States)

    2013-06-14

    ... Rico and U. S. Virgin Island port communities. This action would modify existing safety zones... federal holidays. The telephone number is 202-366-9329. See the ``Public Participation and Request for..., except federal holidays. 3. Privacy Act Anyone can search the electronic form of comments received into...

  14. Regional security in Southeast Asia and the South Pacific

    International Nuclear Information System (INIS)

    Pande, Amba

    2002-01-01

    Ever since the weapons of mass destruction have become an international currency of power, the efforts for their control and elimination have also developed simultaneously, as an important stream in international politics. Countries all over the globe have strived to evolve various devices to ensure security against these weapons at international, regional as well as national levels. One such regional effort for nuclear arms control is the creation of nuclear-free zone. The nuclear free zones present a potentially effective option to supplement the global nuclear disarmament regime. This is an endeavour towards crisis management, reducing the threat perception, common security and confidence building. In addition, they help in creating a regional security order by developing a code of conduct which binds external actors as well as the regional countries. They are meant to reduce if not eliminate the likelihood of a region getting involved into the war of mass destruction. It is in this context the cases of Southeast Asia and the South Pacific nuclear-free zones have been discussed in this book

  15. Computer Security at Nuclear Facilities

    International Nuclear Information System (INIS)

    Cavina, A.

    2013-01-01

    This series of slides presents the IAEA policy concerning the development of recommendations and guidelines for computer security at nuclear facilities. A document of the Nuclear Security Series dedicated to this issue is on the final stage prior to publication. This document is the the first existing IAEA document specifically addressing computer security. This document was necessary for 3 mains reasons: first not all national infrastructures have recognized and standardized computer security, secondly existing international guidance is not industry specific and fails to capture some of the key issues, and thirdly the presence of more or less connected digital systems is increasing in the design of nuclear power plants. The security of computer system must be based on a graded approach: the assignment of computer system to different levels and zones should be based on their relevance to safety and security and the risk assessment process should be allowed to feed back into and influence the graded approach

  16. Web-Services Development in Secure Way for Highload Systems

    Directory of Open Access Journals (Sweden)

    V. M. Nichiporchouk

    2011-12-01

    Full Text Available This paper describes approach to design of web-services in secure, high load and fault tolerant implementation for mass message processing. The multicomponent architecture of web-service with possibility for high security zone is provided as well as scalability evaluation of the architecture.

  17. 78 FR 54392 - Security Zone, Baltimore Harbor, Baltimore's Inner Harbor; Baltimore, MD

    Science.gov (United States)

    2013-09-04

    ... Department of Homeland Security FR Federal Register NPRM Notice of Proposed Rulemaking A. Regulatory History... the maritime safety and security of the general public. B. Basis and Purpose The National Football...

  18. Cyber Security: A Crisis of Prioritization

    Science.gov (United States)

    2005-02-01

    Society (CITRIS) and Professor University of California, Berkeley J. Carter Beese , Jr. President Riggs Capital Partners Pedro Celis, Ph.D. Software...Science University of North Carolina at Chapel Hill William J. Hannigan President AT&T Jonathan C. Javitt, M.D., M.P.H. Senior Fellow Potomac Institute...CHAIR F. Thomson Leighton MEMBERS J. Carter Beese , Jr. Patricia Thomas Evans Luis E. Fiallo Harold Mortazavian David A. Patterson Alice G

  19. 76 FR 61259 - Safety Zone; Monte Foundation Fireworks Extravaganza, Aptos, CA

    Science.gov (United States)

    2011-10-04

    ... meant for entertainment purposes. This safety zone is issued to establish a temporary [[Page 61260... Standards The National Technology Transfer and Advancement Act (NTTAA) (15 U.S.C. 272 note) directs agencies... changing Regulated Navigation Areas and security or safety zones. An environmental analysis checklist and a...

  20. 33 CFR 147.809 - Mars Tension Leg Platform safety zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Mars Tension Leg Platform safety... SECURITY (CONTINUED) OUTER CONTINENTAL SHELF ACTIVITIES SAFETY ZONES § 147.809 Mars Tension Leg Platform safety zone. (a) Description. The Mars Tension Leg Platform (Mars TLP) is located at position 28°10′10.29...

  1. 33 CFR 147.839 - Mad Dog Truss Spar Platform safety zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Mad Dog Truss Spar Platform... SECURITY (CONTINUED) OUTER CONTINENTAL SHELF ACTIVITIES SAFETY ZONES § 147.839 Mad Dog Truss Spar Platform safety zone. (a) Description. Mad Dog Truss Spar Platform, Green Canyon 782 (GC 782), located at position...

  2. Nuclear-weapon-free zones in the Asia Pacific region

    International Nuclear Information System (INIS)

    Yamada, Eiji

    1997-01-01

    The Review and Extension Conference of the Parties to the Non-Proliferation Treaty decided on the indefinite extension of the Treaty, and adopted two documents 'principles and Objectives for Nuclear Non-Proliferation and Disarmament' and 'Strengthening the Review Process for the Treaty'. In the former document, the Conference encourages the establishment of nuclear-weapon-free zones, on the conviction that such zones will enhance global and regional peace and security. Besides the Rarotonga Treaty, ASEAN countries plan to establish a nuclear-weapon-free zone in the South-East Asia

  3. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  4. 75 FR 80717 - Safety Zone; Sacramento New Year's Eve, Fireworks Display, Sacramento, CA

    Science.gov (United States)

    2010-12-23

    ... displays are for entertainment purposes. A safety zone is necessary to protect spectators, vessels, and... under Executive Order 13211. Technical Standards The National Technology Transfer and Advancement Act... involves establishing, disestablishing, or changing Regulated Navigation Areas and security or safety zones...

  5. 76 FR 44880 - Security Zone; Escorted Vessels in Captain of the Port Ohio Valley Zone

    Science.gov (United States)

    2011-07-27

    ... potential terrorist acts and would enhance public and maritime safety and security. DATES: Comments and... coast of Yemen and the prior attack on the USS COLE demonstrate the maritime terrorism threat. These attacks manifest a continuing threat to U.S. maritime assets as described in the President's finding in...

  6. 75 FR 67618 - Safety Zone: Richardson Ash Scattering by Fireworks, San Francisco, CA

    Science.gov (United States)

    2010-11-03

    ... fireworks display is meant for entertainment purposes. This safety zone is issued to establish a temporary... under Executive Order 13211. Technical Standards The National Technology Transfer and Advancement Act..., disestablishing, or changing Regulated Navigation Areas and security or safety zones. An environmental analysis...

  7. 33 CFR 147.817 - Sir Douglas Morpeth Tension Leg Platform safety zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Sir Douglas Morpeth Tension Leg... HOMELAND SECURITY (CONTINUED) OUTER CONTINENTAL SHELF ACTIVITIES SAFETY ZONES § 147.817 Sir Douglas Morpeth Tension Leg Platform safety zone. (a) Description. The Sir Douglas Morpeth Tension Leg Platform (Morpeth...

  8. 75 FR 34376 - Safety Zone; City of Pittsburg Independence Day Celebration, Pittsburg, CA

    Science.gov (United States)

    2010-06-17

    ... display is meant for entertainment purposes. This safety zone is issued to establish a temporary... 13211. Technical Standards The National Technology Transfer and Advancement Act (NTTAA) (15 U.S.C. 272..., disestablishing, or changing Regulated Navigation Areas and security or safety zones. An environmental analysis...

  9. Confidence- and security-building in South-East Asia. Working group II

    International Nuclear Information System (INIS)

    Alagappa, M.

    1991-01-01

    Discussion in the Working Group II focused on the following subjects: the establishment of a zone of peace, freedom and neutrality in South-East Asia; the establishment of a nuclear weapon-free zone in South-East Asia; the Cambodian conflict; regional co-operation; military security confidence-building measures

  10. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  11. The real value of nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    Carasales, J.

    1998-01-01

    The international community has greeted the establishment of two new nuclear weapon-free zones with praise. Africa and South Asia are the regions which will join, once the respective treaties are ratified and in force, Latin America and the South Pacific to ensure that extensive areas of the earth remain free of nuclear weapons. The usual reaction to these accomplishments is to hail them as important contributions to international peace and security, and as meaningful steps towards a world free of nuclear weapons. The nuclear weapon-free zones have their value but this value relates mainly to the countries within the zone. The interest of nuclear-weapon states are not really affected, or, if they are, the influence is not significant. One should bear in mind that the really important and meaningful nuclear weapon-free zones have yet to be achieved

  12. Cyber secure systems approach for NPP digital control systems

    Energy Technology Data Exchange (ETDEWEB)

    McCreary, T. J.; Hsu, A. [HF Controls Corporation, 16650 Westgrove Drive, Addison, TX 75001 (United States)

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant and distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from

  13. Cyber secure systems approach for NPP digital control systems

    International Nuclear Information System (INIS)

    McCreary, T. J.; Hsu, A.

    2006-01-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant and distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to

  14. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  15. 75 FR 65236 - Security Zone, in the Vicinity of the Michoud Slip Position 30°0′34.2″ N, 89°55′40.7″ W to...

    Science.gov (United States)

    2010-10-22

    ...-AA87 Security Zone, in the Vicinity of the Michoud Slip Position 30[deg]0'34.2'' N, 89[deg]55'40.7'' W to Position 30[deg]0'29.5'' N, 89[deg]55'52.6'' W AGENCY: Coast Guard, DHS. ACTION: Temporary final... the entire slip from position 30[deg]0'34.2'' N, 89[deg]55'40.7'' W to position 30[deg]0'29.5'' N, 89...

  16. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    published books and peer reviewed journal articles. The Congressional Research Service being the key source on congressional procedure and theory ...Transportation Committee 1 Senate Homeland Security & Governmental Affairs Committee 15 Senate Small Business & Entrepreneurship 1 Senate Special...military contracting procedures in a war zone are not necessarily oversight of national security functions, reviews of FEMA contracting practices

  17. Minimum deterrence and regional security. Section 2. Other regions

    International Nuclear Information System (INIS)

    Azikiwe, A.E.

    1993-01-01

    Compared to European political and security circumstance, minimum deterrence is less an illusion in other regions where weapon free zones already exist. It will continue to be relevant to the security of other regions. Strategic arms limitation should be pursued vigorously in a constructive and pragmatic manner, bearing in mind the need to readjust to new global challenges. The Comprehensive Test Ban Treaty is the linchpin on which the Non-proliferation Treaty rests

  18. Hydrostratigraphy, soil/sediment chemistry, and water quality, Potomac-Raritan-Magothy aquifer system, Puchack Well Field Superfund site and vicinity, Pennsauken Township, Camden County, New Jersey, 1997-2001

    Science.gov (United States)

    Barringer, Julia L.; Walker, Richard L.; Jacobsen, Eric; Jankowski, Pamela

    2010-01-01

    Drinking-water supplies from the Potomac-Raritan-Magothy aquifer system at the Puchack well field in Pennsauken Township, Camden County, New Jersey, have been contaminated by hexavalent chromium-the most toxic and mobile form-at concentrations exceeding the New Jersey maximum contaminant level of 100 micrograms per liter. Also, scattered but widespread instances of volatile organic compounds (primarily trichloroethylene) at concentrations that exceed their respective maximum contaminant levels in the area's ground water have been reported. Because inorganic and organic contaminants are present in the ground water underlying the Puchack well field, no water from there has been withdrawn for public supply since 1998, when the U.S. Environmental Protection Agency (USEPA) added the area that contains the Puchack well field to the National Priorities List. As part of the USEPA's investigation of the Puchack Well Field Superfund site, the U.S. Geological Survey (USGS) conducted a study during 1997-2001 to (1) refine previous interpretations of the hydrostratigraphic framework, hydraulic gradients, and local directions of ground-water flow; (2) describe the chemistry of soils and saturated aquifer sediments; and (3) document the quality of ground water in the Potomac-Raritan-Magothy aquifer system in the area. The four major water-bearing units of the Potomac-Raritan-Magothy aquifer system-the Upper aquifer (mostly unsaturated in the study area), the Middle aquifer, the Intermediate Sand (a local but important unit), and the Lower aquifer-are separated by confining units. The confining units contain areas of cut and fill, resulting in permeable zones that permit water to pass through them. Pumping from the Puchack well field during the past 3 decades resulted in downward hydraulic gradients that moved contaminants into the Lower aquifer, in which the production wells are finished, and caused ground water to flow northeast, locally. A comparison of current (1997

  19. Definition of Management Zones for Enhancing Cultivated Land Conservation Using Combined Spatial Data

    Science.gov (United States)

    Li, Yan; Shi, Zhou; Wu, Hao-Xiang; Li, Feng; Li, Hong-Yi

    2013-10-01

    The loss of cultivated land has increasingly become an issue of regional and national concern in China. Definition of management zones is an important measure to protect limited cultivated land resource. In this study, combined spatial data were applied to define management zones in Fuyang city, China. The yield of cultivated land was first calculated and evaluated and the spatial distribution pattern mapped; the limiting factors affecting the yield were then explored; and their maps of the spatial variability were presented using geostatistics analysis. Data were jointly analyzed for management zone definition using a combination of principal component analysis with a fuzzy clustering method, two cluster validity functions were used to determine the optimal number of cluster. Finally one-way variance analysis was performed on 3,620 soil sampling points to assess how well the defined management zones reflected the soil properties and productivity level. It was shown that there existed great potential for increasing grain production, and the amount of cultivated land played a key role in maintaining security in grain production. Organic matter, total nitrogen, available phosphorus, elevation, thickness of the plow layer, and probability of irrigation guarantee were the main limiting factors affecting the yield. The optimal number of management zones was three, and there existed significantly statistical differences between the crop yield and field parameters in each defined management zone. Management zone I presented the highest potential crop yield, fertility level, and best agricultural production condition, whereas management zone III lowest. The study showed that the procedures used may be effective in automatically defining management zones; by the development of different management zones, different strategies of cultivated land management and practice in each zone could be determined, which is of great importance to enhance cultivated land conservation

  20. Determination of action zone in the nuclear / radiology handling process

    International Nuclear Information System (INIS)

    Ade Awalludin

    2013-01-01

    Assessment has been conducted on determination of action zone in nuclear or radiological emergency. The assessment is taken into account radiological risk level in nuclear or radiological emergency management process outside nuclear installation. Managing of nuclear emergency is same as that one of other emergency by adding the principles of radiation protection. This study aims to provide guidance in making of safety and security perimeter outside the nuclear installation for first responders during nuclear/radiological emergency based on dose rate, contamination level or distance from the scene. Separation of working zone is important for first responder safety that works in radiological environment in the event of nuclear or radiation emergency without violating their standard operating procedure. Value limit of safety and security perimeter has been made according to the conditions in Indonesia and considering the applicability in practical. (author)

  1. Diverse dinosaur-dominated ichnofaunas from the Potomac Group (Lower Cretaceous) Maryland

    Science.gov (United States)

    Stanford, Ray; Lockley, Martin G.; Weems, Robert E.

    2007-01-01

    Until recently fossil footprints were virtually unknown from the Cretaceous of the eastern United States. The discovery of about 300 footprints in iron-rich siliciclastic facies of the Patuxent Formation (Potomac Group) of Aptian age is undoubtedly one of the most significant Early Cretaceous track discoveries since the Paluxy track discoveries in Texas in the 1930s. The Patuxent tracks include theropod, sauropod, ankylosaur and ornithopod dinosaur footprints, pterosaur tracks, and miscellaneous mammal and other vertebrate ichnites that collectively suggest a diversity of about 14 morphotypes. This is about twice the previous maximum estimate for any known Early Cretaceous vertebrate ichnofauna. Among the more distinctive forms are excellent examples of hypsilophodontid tracks and a surprisingly large mammal footprint. A remarkable feature of the Patuxent track assemblage is the high proportion of small tracks indicative of hatchlings, independently verified by the discovery of a hatchling-sized dinosaur. Such evidence suggests the proximity of nest sites. The preservation of such small tracks is very rare in the Cretaceous track record, and indeed throughout most of the Mesozoic.This unusual preservation not only provides us with a window into a diverse Early Cretaceous ecosystem, but it also suggests the potential of such facies to provide ichnological bonanzas. A remarkable feature of the assemblage is that it consists largely of reworked nodules and clasts that may have previously been reworked within the Patuxent Formation. Such unusual contexts of preservation should provide intriguing research opportunities for sedimentologists interested in the diagenesis and taphonomy of a unique track-bearing facies.

  2. 77 FR 56549 - Safety Zone; Blue Angels at Kaneohe Bay Air Show, Oahu, HI

    Science.gov (United States)

    2012-09-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2012-0739] RIN 1625-AA00 Safety Zone; Blue Angels at Kaneohe Bay Air Show, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary safety zone while the U.S. Navy...

  3. 75 FR 50952 - Safety Zone; Blue Angels at Kaneohe Bay Air Show, Oahu, HI

    Science.gov (United States)

    2010-08-18

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0705] RIN 1625-AA00 Safety Zone; Blue Angels at Kaneohe Bay Air Show, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Coast Guard proposes two temporary safety zones while the U.S...

  4. 78 FR 37971 - Security Zone; Naval Exercise; Pacific Ocean, Coronado, CA

    Science.gov (United States)

    2013-06-25

    ... Administrative Procedure Act (APA) (5 U.S.C. 553(b)). This provision authorizes an agency to issue a rule without... Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide the Coast Guard in...

  5. Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.

    Science.gov (United States)

    Hirschfeld, Katherine

    Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.

  6. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model

    Science.gov (United States)

    Moghaddasi, Hamid; Kamkarhaghighi, Mehran

    2016-01-01

    Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823

  7. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.

    Science.gov (United States)

    Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran

    2016-01-01

    Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

  8. 77 FR 51912 - Safety Zone; Tom Lyons Productions Fireworks, Long Island Sound, Sands Point, NY

    Science.gov (United States)

    2012-08-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2012-0618] RIN 1625-AA00 Safety Zone; Tom Lyons Productions Fireworks, Long Island Sound, Sands Point, NY AGENCY.... 165.T01-0618 to read as follows: Sec. 165.T01-0618 Safety Zone; Tom Lyons Productions Fireworks, Long...

  9. Grey zones of welfare

    Directory of Open Access Journals (Sweden)

    Ida Harboe Knudsen

    2015-01-01

    Full Text Available In this article I explore the ‘grey zones of welfare’ in rural Lithuania whereby I point to the inherent ambiguities that lies in a system where people to a high degree rely on networks and normative solutions to everyday shortcomings, rather than on the state. I argue that we in the period after socialism witness an increased degree of informal economies and social arrangements, as the formal sector of social security is perceived as unreliable. This results in a model where liberalism and individual ethics co-exist with a strong morality to support the poorest in society.

  10. 77 FR 59551 - Safety Zone, Changes to Original Rule; Boston Harbor's Rock Removal Project, Boston Inner Harbor...

    Science.gov (United States)

    2012-09-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0767] RIN 1625-AA00 Safety Zone, Changes to Original Rule; Boston Harbor's Rock Removal Project, Boston Inner Harbor... original provisions of that temporary final rule, but adds two additional safety zones necessary for the...

  11. DIFFiCULTIES FOR THE CONCEPTUALIZATION OF SECURITY AND DEFENSE

    Directory of Open Access Journals (Sweden)

    JAIME GARCÍA COVARRUBIAS

    2017-12-01

    Full Text Available The purpose of this essay is to assist to make clear the current confusion when conceptualizing Security and Defense, a fact that impacts the production of educational plans and programs in this issues, taking at the same time a position regarding these concepts. In fact, one of the reasons in the theoretical arena of this difficulty is the existence of a grey zone between each of them, that impacts the security planning process that somehow looses its most important feature, that is, to be clear, precise and focused. To achieve this objective, a relationship between democracy and security is settled, and then differences between both of them will be established. After that, an analysis between “real security” and the one perceived, as well as between effects and conditions will be done in order to conclude that National Security integrates the different sectors’ securities and is vital for the prevailing of the State and its citizens, while citizen security is oriented toward the individuals and must not be confused with National Security. Also, that Defense is another sector of Security, and finally that governments must understood that there will be an space between the current situation or objective security and the perception of how the people believe to live.

  12. Risk Assessment of Maize Drought Disaster in Agro-Pastoral Transitional Zone in North China

    Science.gov (United States)

    Jia, H.; Pan, D.

    2017-12-01

    Agricultural drought is one of the focuses of global concern and one of the natural disasters that affect the agriculture production mostly in China. Farming-pastoral zones in China are located in the monsoon fringe area, precipitation of which is extremely unstable, and drought occurs frequently. The agro-pastoral transitional zone in North China is one of the main producing areas of northern spring maize in northern China, and maize is the second largest grain crop in the region. An assessment of the risk of drought disaster in this region is therefore important in ensuring a reduction in such disasters and an increase in food security. A risk assessment model, EPIC (Environmental Policy Integrated Climate) model, for maize drought disasters based on the Erosion Productivity Impact Calculator crop model is proposed for areas with the topographic characteristics of agro-pastoral transitional zone in North China. The results showed that the hazard risk level for the maize zone of agro-pastoral transitional zone in North China is generally high. Most hazard index values were between 0.4 and 0.5, accounting for 48.77% of total study area. The high-risk areas were mainly distributed in Ordos Plateau (South of Inner Mongolia Autonomous region), South of Ningxia Hui Autonomous Region and Center of Gansu Province. These results provide a scientific basis and support for the reduction of agricultural drought disasters and an increase in food security in the agro-pastoral transitional zone in North China.

  13. Operating Security System Support for Run-Time Security with a Trusted Execution Environment

    DEFF Research Database (Denmark)

    Gonzalez, Javier

    Software services have become an integral part of our daily life. Cyber-attacks have thus become a problem of increasing importance not only for the IT industry, but for society at large. A way to contain cyber-attacks is to guarantee the integrity of IT systems at run-time. Put differently......, it is safe to assume that any complex software is compromised. The problem is then to monitor and contain it when it executes in order to protect sensitive data and other sensitive assets. To really have an impact, any solution to this problem should be integrated in commodity operating systems...... sensitive assets at run-time that we denote split-enforcement, and provide an implementation for ARM-powered devices using ARM TrustZone security extensions. We design, build, and evaluate a prototype Trusted Cell that provides trusted services. We also present the first generic TrustZone driver...

  14. Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones

    NARCIS (Netherlands)

    Borgolte, Kevin; Hao, Shuang; Fiebig, T.; Vigna, Giovanny

    2018-01-01

    Security research has made extensive use of exhaustive Internet-wide scans over the recent years, as they can provide significant insights into the overall state of security of the Internet, and ZMap made scanning the entire IPv4 address space practical. However, the IPv4 address space is exhausted,

  15. 75 FR 25111 - Safety Zone; KFOG Kaboom, Fireworks Display, San Francisco, CA

    Science.gov (United States)

    2010-05-07

    ... entertainment purposes. This safety zone establishes a temporary restricted area on the waters surrounding the... of Energy Effects under Executive Order 13211. Technical Standards The National Technology Transfer.... This rule involves establishing, disestablishing, or changing Regulated Navigation Areas and security...

  16. 75 FR 44720 - Safety Zone; Live-Fire Gun Exercise, M/V Del Monte, James River, VA

    Science.gov (United States)

    2010-07-29

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0585] RIN 1625-AA00 Safety Zone; Live-Fire Gun Exercise, M/V Del Monte, James River, VA AGENCY: Coast Guard, DHS... follows: Sec. 165.T05-0585 Safety Zone; Live-Fire Gun Exercise, M/V Del Monte, James River, VA (a...

  17. Methodological Bases for Ranking the European Union Countries in Terms of Macroeconomic Security

    Directory of Open Access Journals (Sweden)

    Tymoshenko Olena V.

    2015-11-01

    Full Text Available The fundamental contradictions of existing methodical approaches to assessing the level of the state economic security have been substantiated and proposals on the introduction of a unified methodology for its assessment, which would be acceptable for use at the international level or for a specific cluster of countries, have been developed. Based on the conducted researches it has been found that the there are no unified signs for such classification of countries. To determine the most significant coefficients and critical values of the indicators of economic security, it is appropriate that the countries should be grouped in terms of the level of the economic development proposed by the UN Commission and the IMF. Analysis of the economic security level has been conducted for the countries-members of the European Union as a separate cluster of countries on the example of macroeconomic security indicators. Based on the evaluation it has been found that the proposed list of indicators and their critical values is economically sound and built on the principle of adequacy, representativeness and comprehensiveness. In 2004 the most secure countries of the EU corresponding to the macroeconomic security standards were Austria, Denmark, Sweden, Finland, and as in 2014 the percentage of absolutely secure countries decreased from 14.3 to 7.1%, only Denmark and Sweden remained in the ranking. During the analyzed period Bulgaria and Croatia got into the risk zone, Estonia, Lithuania, Latvia, Romania were in a danger zone. In 2014 Ukraine in terms of its macroeconomic security was in a critical state, which testified about serious structural and system imbalances in its development.

  18. Explorative study on management model of tourism business zone at Kuta, Bali

    Science.gov (United States)

    Astawa, I. K.; Suardani, A. A. P.; Harmini, A. A. A. N.

    2018-01-01

    Business activities through asset management of indigenous village of Kuta provide an opportunity for the community to participate in improving their welfare. This study aims to analyze the management model of Kuta’s tourism business zone, the involvement of stakeholders in the management of Kuta’s tourism business zone in indigenous village of Kuta and the implications of each business tourism zone in indigenous village of Kuta in the level of community welfare in each zone. Data collection was done by observation, interview, questionnaire, and documentation. The main instrument of this study is the researchers themselves assisted with interview guideline. The results showed that the management model has been arranged in 5 tourism business zones in indigenous village of Kuta. The involvement of all stakeholders in the management of the tourism business zone follows the procedure of execution of duties and provides security, comfort and certainty of doing business activities at each zone. The implications of the tourism business in the level of community welfare in each zone in indigenous village of Kuta have been able to bring happiness in business and all community are satisfied with the income they earned from work in each business zone.

  19. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    International Nuclear Information System (INIS)

    Ibrahim, Ahmad Salah; Jung, Jaecheon

    2016-01-01

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity

  20. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, Ahmad Salah; Jung, Jaecheon [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2016-10-15

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity.

  1. 76 FR 37641 - Safety Zone; Independence Day Fireworks Celebration for the City of Half Moon Bay, Half Moon Bay, CA

    Science.gov (United States)

    2011-06-28

    ... for entertainment purposes. This safety zone establishes a temporary restricted area on the waters... under Executive Order 13211. Technical Standards The National Technology Transfer and Advancement Act... establishing, disestablishing, or changing Regulated Navigation Areas and security or safety zones. An...

  2. 33 CFR 165.T11-304 - Safety zone; Sea World Summer Nights Fireworks; Mission Bay, San Diego, California.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety zone; Sea World Summer... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Eleventh Coast Guard District § 165.T11-304 Safety zone; Sea World Summer Nights Fireworks...

  3. 75 FR 34374 - Safety Zone; Stockton Ports Baseball Club/City of Stockton, 4th of July Fireworks Display...

    Science.gov (United States)

    2010-06-17

    ... entertainment purposes. The purpose of the safety zone is to establish a temporary restricted area on the waters... National Technology Transfer and Advancement Act (NTTAA) (15 U.S.C. 272 note) directs agencies to use... changing Regulated Navigation Areas and security or safety zones. An environmental analysis checklist and a...

  4. Community-level response of fishes and aquatic macroinvertebrates to stream restoration in a third-order tributary of the Potomac River, USA

    Science.gov (United States)

    Selego, Stephen M.; Rose, Charnee L.; Merovich, George T.; Welsh, Stuart A.; Anderson, James T.

    2012-01-01

    Natural stream channel design principles and riparian restoration practices were applied during spring 2010 to an agriculturally impaired reach of the Cacapon River, a tributary of the Potomac River which flows into the Chesapeake Bay. Aquatic macroinvertebrates and fishes were sampled from the restoration reach, two degraded control, and two natural reference reaches prior to, concurrently with, and following restoration (2009 through 2010). Collector filterers and scrapers replaced collector gatherers as the dominant macroinvertebrate functional feeding groups in the restoration reach. Before restoration, based on indices of biotic integrity (IBI), the restoration reach fish and macroinvertebrate communities closely resembled those sampled from the control reaches, and after restoration more closely resembled those from the reference reaches. Although the macroinvertebrate community responded more favorably than the fish community, both communities recovered quickly from the temporary impairment caused by the disturbance of restoration procedures and suggest rapid improvement in local ecological conditions.

  5. A nuclear-weapons-free zone in Southeast Asia : problems and prospects

    International Nuclear Information System (INIS)

    Alagappa, M.

    1987-01-01

    Although the idea of a nuclear-weapons-free zone was already recognised in the Kuala Lumpur Declaration of 1971 and has been on the Asean agenda since the late 1970s as a component of the package to realise a Zone of Peace, Freedom and Neutrality in Southeast Asia, the formal initiative to make the region a nuclear-weapons-free zone is of relatively recent origin. The security benefits that are likely to accrue from declaring Southeast Asia nuclear-weapons-free are rather marginal. Benefits, as there are, are in the political and diplomatic realm where the proposed agreement can be used to influence the conduct of international relations which in turn may have the potential to modify the strategic environment of Southeast Asia

  6. Precursor of other nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    Roman-Morey, E.

    1997-01-01

    Based on the analysis of the long process of negotiations for implementing the Treaty of Tlatelolco and its history during the last three decades, especially its influence on other regions of the world for stimulating the creation of new nuclear-weapon-free zones, the following conclusions were drawn: nuclear danger still persists; the end of Cold War implies the end of a nuclear threat; the nuclear fear should not become nuclear complacency and be accepted by international community; common security as the goal of international community should be recognised and definitive abolition of nuclear weapons should be sought; the Treaty of Tlatelolco represents the cornerstone for creating new nuclear-weapon-free zones; Treaties of Tlatelolco, Rarotonga, Bangkok and Pelindaba should be examples to be followed by other regions and groups of countries for creating new nuclear-weapon-free zones which should be recognised as very important phase in achieving a nuclear-weapon-free world and means for attaining an international regime of non-proliferation of weapons for mass destruction

  7. Technical Training Skills Needs of Youth for Sustainable Job Security in Rice Production in Ebonyi State, Nigeria

    Science.gov (United States)

    Edu, Chukwuma Nwofe; Ogba, Ernest Ituma

    2016-01-01

    The study identifies technical training skills needs of youth for sustainable job security in rice production in Ebonyi State, Nigeria. This study was carried out in secondary schools in three educational zones in Ebonyi State, Nigeria. Ebonyi state is one of the states in the southeast geopolitical zone in Nigeria. Descriptive survey design was…

  8. Community-Level Response of Fishes and Aquatic Macroinvertebrates to Stream Restoration in a Third-Order Tributary of the Potomac River, USA

    Directory of Open Access Journals (Sweden)

    Stephen M. Selego

    2012-01-01

    Full Text Available Natural stream channel design principles and riparian restoration practices were applied during spring 2010 to an agriculturally impaired reach of the Cacapon River, a tributary of the Potomac River which flows into the Chesapeake Bay. Aquatic macroinvertebrates and fishes were sampled from the restoration reach, two degraded control, and two natural reference reaches prior to, concurrently with, and following restoration (2009 through 2010. Collector filterers and scrapers replaced collector gatherers as the dominant macroinvertebrate functional feeding groups in the restoration reach. Before restoration, based on indices of biotic integrity (IBI, the restoration reach fish and macroinvertebrate communities closely resembled those sampled from the control reaches, and after restoration more closely resembled those from the reference reaches. Although the macroinvertebrate community responded more favorably than the fish community, both communities recovered quickly from the temporary impairment caused by the disturbance of restoration procedures and suggest rapid improvement in local ecological conditions.

  9. Research of Smart Grid Cyber Architecture and Standards Deployment with High Adaptability for Security Monitoring

    DEFF Research Database (Denmark)

    Hu, Rui; Hu, Weihao; Chen, Zhe

    2015-01-01

    Security Monitoring is a critical function for smart grid. As a consequence of strongly relying on communication, cyber security must be guaranteed by the specific system. Otherwise, the DR signals and bidding information can be easily forged or intercepted. Customers’ privacy and safety may suffer...... huge losses. Although OpenADR specificationsprovide continuous, secure and reliable two-way communications in application level defined in ISO model, which is also an open architecture for security is adopted by it and no specific or proprietary technologies is restricted to OpenADR itself....... It is significant to develop a security monitoring system. This paper discussed the cyber architecture of smart grid with high adaptability for security monitoring. An adaptable structure with Demilitarized Zone (DMZ) is proposed. Focusing on this network structure, the rational utilization of standards...

  10. Social Status, Traditional Food Taboos and Food Security: A Study ...

    African Journals Online (AJOL)

    A study was conducted to examine adherence to traditional food taboos by women in Imo State, and relate that to social status and food security. Data was collected from 72 women across the three agricultural zones of the State. It was found that age, income and education are some factors affecting adherence to these ...

  11. 77 FR 15263 - Security Zone; Portland Rose Festival on Willamette River; Portland, OR

    Science.gov (United States)

    2012-03-15

    ... Zone; Portland Rose Festival on Willamette River; Portland, OR AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY: The Coast Guard will enforce the Portland Rose Festival... Willamette River during the Portland Rose festival. During the enforcement period, no person or vessel may...

  12. INFORMATION SECURITY IN MOBILE MODULAR MEASURING SYSTEMS

    Directory of Open Access Journals (Sweden)

    A. N. Tkhishev

    2017-01-01

    Full Text Available A special aspect of aircraft test is carrying out both flight evaluation and ground operation evaluation in a structure of flying aids and special tools equipment. The specific of flight and sea tests involve metering in offshore zone, which excludes the possibility of fixed geodetically related measuring tools. In this regard, the specific role is acquired by shipbased measurement systems, in particular the mobile modular measuring systems. Information processed in the mobile modular measurement systems is a critical resource having a high level of confidentiality. When carrying out their functions, it should be implemented a proper information control of the mobile modular measurement systems to ensure their protection from the risk of data leakage, modification or loss, i.e. to ensure a certain level of information security. Due to the specific of their application it is difficult to solve the problems of information security in such complexes. The intruder model, the threat model, the security requirements generated for fixed informatization objects are not applicable to mobile systems. It was concluded that the advanced mobile modular measuring systems designed for flight experiments monitoring and control should be created due to necessary information protection measures and means. The article contains a diagram of security requirements formation, starting with the data envelopment analysis and ending with the practical implementation. The information security probabilistic model applied to mobile modular measurement systems is developed. The list of current security threats based on the environment and specific of the mobile measurement system functioning is examined. The probabilistic model of the information security evaluation is given. The problems of vulnerabilities transformation of designed information system into the security targets with the subsequent formation of the functional and trust requirements list are examined.

  13. Information fusion for the Gray Zone

    Science.gov (United States)

    Fenstermacher, Laurie

    2016-05-01

    United States Special Operations Command (SOCOM) recently published a white paper describing the "Gray Zone", security challenges characterized by "ambiguity about the nature of the conflict, opacity of the parties involved…competitive interactions among and within state and non-state actors that fall between the traditional war and peace duality."1 Ambiguity and related uncertainty about actors, situations, relationships, and intent require new approaches to information collection, processing and fusion. General Votel, the current SOCOM commander, during a recent speech on "Operating in the Gray Zone" emphasized that it would be important to get left of the next crises and stated emphatically, "to do that we must understand the Human Domain."2 This understanding of the human domain must come from making meaning based on different perspectives, including the "emic" or first person/participant and "etic" or third person/observer perspectives. Much of the information currently collected and processed is etic. Incorporation and fusion with the emic perspective enables forecasting of behaviors/events and provides context for etic information (e.g., video).3 Gray zone challenges are perspective-dependent; for example, the conflict in Ukraine is interpreted quite differently by Russia, the US and Ukraine. Russia views it as war, necessitating aggressive action, the US views it as a security issue best dealt with by economic sanctions and diplomacy and the Ukraine views it as a threat to its sovereignty.4 General Otto in the Air Force ISR 2023 vision document stated that Air Force ISR is needed to anticipate strategic surprise.5 Anticipatory analysis enabling getting left of a crisis inherently requires a greater focus on information sources that elucidate the human environment as well as new methods that elucidate not only the "who's" and "what's", but the "how's and "why's," extracting features and/or patterns and subtle cues useful for forecasting behaviors and

  14. 77 FR 65621 - Security Zone; Cruise Ships, Santa Barbara Harbor, Santa Barbara, CA

    Science.gov (United States)

    2012-10-30

    ... able to locate the cruise ships visually, due to the small geographic size and depth restrictions of... entities because vessel traffic can pass safely around the zones. If you think that your business... significant economic impact on it, please submit a comment (see ADDRESSES) explaining why you think it...

  15. 75 FR 81856 - Security Zone, Michoud Slip Position 30°0′34.2″ N, 89°55′40.7″ W to Position 30°0′29.5″ N, 89°55...

    Science.gov (United States)

    2010-12-29

    ...-AA87 Security Zone, Michoud Slip Position 30[deg]0'34.2'' N, 89[deg]55'40.7'' W to Position 30[deg]0'29.5'' N, 89[deg]55'52.6'' W AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The... position 30[deg]0'34.2'' N, 89[deg]55'40.7'' W to position 30[deg]0'29.5'' N, 89[deg]55'52.6'' W across the...

  16. 75 FR 33170 - Safety Zone; City of Martinez 4th of July Fireworks, Martinez, CA

    Science.gov (United States)

    2010-06-11

    ... is meant for entertainment purposes and will be used to celebrate Independence Day. The fireworks... under Executive Order 13211. Technical Standards The National Technology Transfer and Advancement Act... involves establishing, disestablishing, or changing Regulated Navigation Areas and security or safety zones...

  17. Global Climate Change, Food Security and the U.S. Food System

    Science.gov (United States)

    Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula

    2013-01-01

    Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.

  18. 76 FR 31851 - Safety Zone; Put-in-Bay Fireworks, Fox's the Dock Pier; South Bass Island, Put-in-Bay, OH

    Science.gov (United States)

    2011-06-02

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0417] RIN 1625-AA00 Safety Zone; Put-in-Bay Fireworks, Fox's the Dock Pier; South Bass Island, Put-in-Bay, OH AGENCY.... Add Sec. 165.T09-0417 as follows: Sec. 165.T09-0417 Safety Zone; Put-In-Bay Fireworks, Fox's the Dock...

  19. Use of the mechanical leech for successful zone I replantation.

    Science.gov (United States)

    Kim, Sang Wha; Han, Hyun Ho; Jung, Sung-No

    2014-01-01

    Replantation of zone I finger injuries remains a challenge, particularly if the fingertip was previously scarred or atrophied, which makes it difficult to secure a suitable vein at the amputation site. In cases of artery-only anastomosis, we propose using a mechanical leech technique to maintain sufficient venous outflow until the internal circulation regenerates. We applied this procedure to eight patients who had zone 1 amputations without veins that were suitable for anastomosis. Emergent surgery was performed and an artery-only anastomosis was created. As there were no veins available, we cut a branch of the central artery and anastomosed it with a 24-gauge angioneedle, which served as a conduit for venous drainage. The overall survival rate for zone I replantation using mechanical leech was 87.5% and the average time to maintain the mechanical leech was 5 days. The mechanical leech technique may serve as an alternative option for the management of venous congestion when no viable veins are available.

  20. Use of the Mechanical Leech for Successful Zone I Replantation

    Directory of Open Access Journals (Sweden)

    Sang Wha Kim

    2014-01-01

    Full Text Available Replantation of zone I finger injuries remains a challenge, particularly if the fingertip was previously scarred or atrophied, which makes it difficult to secure a suitable vein at the amputation site. In cases of artery-only anastomosis, we propose using a mechanical leech technique to maintain sufficient venous outflow until the internal circulation regenerates. We applied this procedure to eight patients who had zone 1 amputations without veins that were suitable for anastomosis. Emergent surgery was performed and an artery-only anastomosis was created. As there were no veins available, we cut a branch of the central artery and anastomosed it with a 24-gauge angioneedle, which served as a conduit for venous drainage. The overall survival rate for zone I replantation using mechanical leech was 87.5% and the average time to maintain the mechanical leech was 5 days. The mechanical leech technique may serve as an alternative option for the management of venous congestion when no viable veins are available.

  1. 78 FR 74009 - Safety Zone; Nike Fireworks, Upper New York Bay, Ellis Island, NY

    Science.gov (United States)

    2013-12-10

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2013-0962] Safety Zone; Nike Fireworks, Upper New York Bay, Ellis Island, NY AGENCY: Coast Guard, DHS. ACTION: Notice of... published in the Federal Register on November 9, 2011 (76 FR 69614). [[Page 74010

  2. 78 FR 35103 - Extension of Border Zone in the State of New Mexico

    Science.gov (United States)

    2013-06-12

    ..., established in 1953, was intended to promote the economic stability of the border region by allowing for freer... having to obtain a Form I-94. Although the border zone was intended to promote the economic stability of... maintain security of the border while increasing economic activity in New Mexico's border region and...

  3. A Reconnaissance for Emerging Contaminants in the South Branch Potomac River, Cacapon River, and Williams River Basins, West Virginia, April-October 2004

    Science.gov (United States)

    Chambers, Douglas B.; Leiker, Thomas J.

    2006-01-01

    In 2003 a team of scientists from West Virginia Division of Natural Resources and the U. S. Geological Survey found a high incidence of an intersex condition, oocytes in the testes, among smallmouth bass (Micropterus dolomieu) in the South Branch Potomac River and the Cacapon River of West Virginia, indicating the possible presence of endocrine-disrupting compounds (EDCs). Possible sources of EDCs include municipal and domestic wastewater, and agricultural and industrial activities. Several sampling strategies were used to identify emerging contaminants, including potential EDCs, and their possible sources in these river basins and at an out-of-basin reference site. Passive water-sampling devices, which accumulate in-stream organic chemical compounds, were deployed for 40-41 days at 8 sampling sites. Sampler extracts were analyzed for a broad range of polar and non-polar organic compounds including pesticides, flame retardants, pharmaceuticals, and personal-care products. Analysis of passive-sampler extracts found 4 compounds; hexachloro-benzene; pentachloroanisole; 2,2',4,4',5-penta-bromo-diphenyl ether (BDE 47); and 2,2',4,4',6-penta-bromo-diphenyl ether (BDE 99) to be present at every sampled site, including the reference site, and several sites had detectable quantities of other compounds. No detectable quantity of any antibiotics was found in any passive-sampler extract. Effluent samples were analyzed for 39 antibiotics as tracers of human and agricultural waste. Additionally, poultry-processing plant effluent was sampled for roxarsone, an organoarsenic compound used as a poultry-feed additive, and other arsenic species as tracers of poultry waste. Antibiotics were detected in municipal wastewater, aquaculture, and poultry-processing effluent, with the highest number of antibiotics and the greatest concentrations found in municipal effluent. Arsenate was the only arsenic species detected in the poultry-processing plant effluent, at a concentration of 1.0 ?g

  4. Statement to Second Conference of States Parties to African Nuclear-Weapon-Free Zone Treaty, 12 November 2012, Addis Ababa, Ethiopia

    International Nuclear Information System (INIS)

    Amano, Y.

    2012-01-01

    It is a great pleasure for me to address this Second Conference of States Parties to the Treaty of Pelindaba. I compliment the countries of Africa for their tenacity in pursuing the goal of establishing a nuclear-weapon-free zone for decades, until the Treaty finally entered into force in 2009. Nuclear-weapon-free zones are a highly effective means of non-proliferation, arms control and disarmament. The five nuclear-weapon-free zones in existence today cover a total of 113 countries. Each has its own special characteristics, but they also have many important elements in common. All nuclear-weapon-free zones prohibit the development, stationing or testing of nuclear weapons in their respective regions. They all cover large inhabited areas. They provide for IAEA verification of the non-diversion of nuclear material. Nuclear-weapon-free zones have brought real security benefits, both regionally and to the whole world. The Treaty of Pelindaba incorporates a number of special features, including some measures which go beyond undertakings assumed by States Parties to the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) . For example, it makes provision for the dismantling and destruction of nuclear explosive devices manufactured by a Party to the Treaty before the Treaty entered into force. It prohibits attacks on nuclear installations in the nuclear-weapon-free zone. It bars the dumping of radioactive waste within the zone. In addition, the Treaty of Pelindaba contains a commitment to promote the use of nuclear science and technology for economic and social development. Parties are encouraged to make use of the assistance of the IAEA. They also pledge to maintain the highest standards of security and physical protection of nuclear material, facilities and equipment. In the Preamble to the Treaty, the Parties recognise that the establishment of other nuclear-weapon-free zones, especially in the Middle East, would enhance their security. Last November, I hosted an

  5. 76 FR 37653 - Safety Zone; Independence Day Fireworks Celebration for the City of Martinez, Martinez, CA

    Science.gov (United States)

    2011-06-28

    ... display is meant for entertainment purposes. This safety zone establishes a temporary restricted area on... of Energy Effects under Executive Order 13211. Technical Standards The National Technology Transfer.... This rule involves establishing, disestablishing, or changing Regulated Navigation Areas and security...

  6. 76 FR 37012 - Safety Zone; Independence Day Fireworks Celebration for the City of Richmond, Richmond, CA

    Science.gov (United States)

    2011-06-24

    ... Park, Richmond, California. The fireworks display is meant for entertainment purposes. This temporary... 13211. Technical Standards The National Technology Transfer and Advancement Act (NTTAA) (15 U.S.C. 272..., disestablishing, or changing Regulated Navigation Areas and security or safety zones. An environmental analysis...

  7. 77 FR 35862 - Safety Zone; Fleet Week Maritime Festival, Pier 66 Elliott Bay, Seattle, WA

    Science.gov (United States)

    2012-06-15

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0062] Safety Zone; Fleet Week Maritime Festival, Pier 66 Elliott Bay, Seattle, WA AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY: The Coast Guard will enforce the Fleet Week Maritime...

  8. 75 FR 29658 - Safety Zone; America's Discount Tire 50th Anniversary, Fireworks Display, South Lake Tahoe, CA

    Science.gov (United States)

    2010-05-27

    ... entertainment purposes. This safety zone establishes a temporary restricted area on the waters surrounding the... of Energy Effects under Executive Order 13211. Technical Standards The National Technology Transfer.... This rule involves establishing, disestablishing, or changing Regulated Navigation Areas and security...

  9. DESIGNING ZONING OF REMOTE SENSING DRONES FOR URBAN APPLICATIONS: A REVIEW

    OpenAIRE

    M. N. Norzailawati; A. Alias; R. S. Akma

    2016-01-01

    This paper discusses on-going research related to zoning regulation for the remote sensing drone in the urban applications. Timestamped maps are presented here follow a citation-based approach, where significant information is retrieved from the scientific literature. The emergence of drones in domestic air raises lots understandable issues on privacy, security and uncontrolled pervasive surveillance that require a careful and alternative solution. The effective solution is to adopt ...

  10. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  11. Ecological security pattern construction based on ecological protection redlines in China

    Science.gov (United States)

    Zou, Changxin

    2017-04-01

    China is facing huge environmental problems with its current rapid rate of urbanization and industrialization, thus causing biodiversity loss, ecosystem service degradation on a major scale. Against this background, three previous examples (the nature reserve policy, the afforestation policy, and the zoning policy) are implemented in China. These all play important roles in protecting natural ecosystems, although they can sometimes cause new problems and lack rigorous targets for environmental outcomes. To overcome current management conflicts, China has proposed a new "ecological protection redlines" policy (EPR). EPR can be defined as the ecological baseline area needed to provide ecosystem services to guarantee and maintain ecological safety. This study analyzed the scope, objectives and technical methods of delineating EPR in China, and put forward the proposed scheme for the ecological security pattern based on EPR. We constructed three kinds of redlines in China, including key ecological function area redlines, ecological sensitive or fragile areas redlines, and forbidden development areas redlines. For the key ecological function area redlines, a total of 38 water conservation functional zones have been designated, covering a total area of 3.23 million km2; 14 soil conservation zones have been designated, covering a total area of 881700 km2; wind-prevention and sand-fixation zones across the country cover a total area of about 1.73 million km2, accounting for 57.13% of the total land area of the whole country. With respect to the ecologically vulnerable redlines, 18 ecologically vulnerable zones has been designated across the country, covering 2.19 million km2, accounting for 22.86% of the total land area of the whole country. Forbidden development areas redlines covered a total area of 3.29 million km2, accounting for 34.3% of the total land area of the whole country. We also suggest to form a complete ecological security pattern including patterns of

  12. Effect of imperfect Faraday mirrors on the security of a Faraday–Michelson quantum cryptography system

    International Nuclear Information System (INIS)

    Wang, Wei-Long; Gao, Ming; Ma, Zhi

    2013-01-01

    The one-way Faraday–Michelson system is a very useful practical quantum cryptography system where Faraday mirrors (FMs) play an important role. In this paper we analyze the security of this system against imperfect FMs. We consider the security loophole caused by imperfect FMs in Alice’s and Bob’s security zones. Then we implement a passive FM attack in this system. By changing the values of the imperfection parameters of Alice’s FMs, we calculate the quantum bit error rate between Alice and Bob induced by Eve and the probability that Eve obtains outcomes successfully. It is shown that the imperfection of one of Alice’s two FMs makes the system sensitive to an attack. Finally we give a modified key rate as a function of the FM imperfections. The security analysis indicates that both Alice’s and Bob’s imperfect FMs can compromise the secure key. (paper)

  13. Management and Area-wide Evaluation of Water Conservation Zones in Agricultural Catchments for Biomass Production, Water Quality and Food Security

    International Nuclear Information System (INIS)

    2016-04-01

    Global land and water resources are under threat from both the agricultural and urban development to meet increased demand for food and from the resulting degradation of the environment. Poor crop yields due to water stress is one of the main reasons for the prevailing hunger and rural poverty in parts of the world. The Green Revolution of the 1960s and 1970s particularly in Latin America and Asia resulted in increased agricultural production and depended partly on water management. In the future, most food will still need to come from rain-fed agriculture. Water conservation zones in agricultural catchments, particularly in rainfed areas, play an important role in the capture and storage of water and nutrients from farmlands and wider catchments, and help improve crop production in times of need in these areas. Water conservation zones are considered to be an important part of water resource management strategies that have been developed to prevent reservoir siltation, reduce water quality degradation, mitigate flooding, enhance groundwater recharge and provide water for farming. In addition to making crop production possible in dry areas, water conservation zones minimize soil erosion, improve soil moisture status through capillary rise and enhance soil fertility and quality. These water conservation zones include natural and constructed wetlands (including riparian wetlands), farm ponds and riparian buffer zones. The management of water conservation zones has been a challenge due to the poor understanding of the relationship between upstream land use and the functions of these zones and their internal dynamics. Knowledge of sources and sinks of water and redefining water and nutrient budgets for water conservation zones are important for optimizing the capture, storage and use of water and nutrients in agricultural landscapes. The overall objective of this coordinated research project (CRP) was to assess and enhance ecosystem services provided by wetlands, ponds

  14. 75 FR 57857 - Safety Zone; Blue Angels at Kaneohe Bay Air Show, Oahu, HI

    Science.gov (United States)

    2010-09-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0705] RIN 1625-AA00 Safety Zone; Blue Angels at Kaneohe Bay Air Show, Oahu, HI AGENCY: Coast Guard, DHS. ACTION...; Blue Angels at Kaneohe Bay Air Show, Oahu, HI in the Federal Register (75 FR 159). We received no...

  15. Designing Zoning of Remote Sensing Drones for Urban Applications: a Review

    Science.gov (United States)

    Norzailawati, M. N.; Alias, A.; Akma, R. S.

    2016-06-01

    This paper discusses on-going research related to zoning regulation for the remote sensing drone in the urban applications. Timestamped maps are presented here follow a citation-based approach, where significant information is retrieved from the scientific literature. The emergence of drones in domestic air raises lots understandable issues on privacy, security and uncontrolled pervasive surveillance that require a careful and alternative solution. The effective solution is to adopt a privacy and property rights approach that create a drone zoning and clear drone legislatures. In providing a differential trend to other reviews, this paper is not limited to drones zoning and regulations, but also, discuss on trend remote sensing drones specification in designing a drone zones. Remote sensing drone will specific according to their features and performances; size and endurance, maximum airspeed and altitude level and particular references are made to the drones range. The implementation of laws zoning could lie with the urban planners whereby, a zoning for drone could become a new tactic used to specify areas, where drones could be used, will provide remedies for the harm that arise from drones, and act as a different against irresponsible behaviour. Finally, underlines the need for next regulations on guidelines and standards which can be used as a guidance for urban decision makers to control the drones' operating, thus ensuring a quality and sustainability of resilience cities simultaneously encouraging the revolution of technology.

  16. NOTICE OF ELECTRICAL CUT - TEST OF THE SECURED NETWORK

    CERN Multimedia

    Electrical Service ST/EL

    2001-01-01

    The electrical service ST/EL will test the switching sequence between the secured network and the diesel generators on January 8, 2002. The normal network, general services of the sites Meyrin, Prevessin, SPS, Zone Nord, LHC1 and LHC18 will be cut between 6:00am and 6:10am. The secured network will be resupplied by the diesel generators after approximately 1 minute. The UPS network will not be affected. To facilitate the restart of the electrical network and to minimize the impact of the tests on critical equipment, we would like to ask you to stop any equipment that might suffer major inconveniences during the tests (e.g. computers). For any further information, please do not hesitate to contact the Technical Control Room TCR (72201) or G. Cumer (160592).

  17. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  18. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  19. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  20. Crop-Specific EU Aid and Smallholder Food Security in Sierra Leone

    Directory of Open Access Journals (Sweden)

    Silvia L. Saravia-Matus

    2016-11-01

    Full Text Available The article analyses the viability of promoting crop-specific programs as a mean to improve smallholder net farm income and food security. The case study explores the relevance of European Union Stabilisation of Export Earnings (STABEX funds in supporting Sierra Leone’s agricultural development agenda. By analysing the drivers of food security for a number of targeted smallholders in the two most important agricultural zones of Sierra Leone, it is possible to compare the suitability of crop-specific support (in rice, cocoa and coffee versus general aid programs (public infrastructure, on and off farm diversification opportunities, sustainable practices, access to productive assets, etc.. The results indicate that crop diversification strategies are widespread and closely related to risk minimisation and enhanced food security among smallholders. Similarly, crop-specific programs mainly focusing on commercialisation tend to overlook important constraints associated to self-consumption and productivity.

  1. The Non-Proliferation Treaty increases security

    International Nuclear Information System (INIS)

    Kahiluoto, K.

    1995-01-01

    Extension of the Nuclear Non-Proliferation Treaty indefinitely was a historic decision. The Treaty is the most extensive international agreement on security policy to date; now its obligations have become a permanent part of international justice. Moreover, the NPT represents a political and moral obligation. Through the NPT, the international community has made a permanent commitment to restrict the proliferation of nuclear weapons. Increasing pressures will be applied to the few countries still outside the NPT, making it more likely that these countries will eventually change their views. The likelihood of regional bans on nuclear weapons in the Middle East and in Asia, too, will increase. The Treaty promotes the establishment of new nuclear-free zones. The nuclear-free zone in Latin America - the countries covered by the Tlatelolco Treaty - is already very close to its full implementation. Finland is firmly committed to the obligations of the Non-Proliferation Treaty. The NPT Conference of 1995 was among the first international meetings in which Finland participated, and took an active role, as a Member State of the European Union. (orig.)

  2. 78 FR 53671 - Regulated Navigation Areas, Security Zones: Dignitary Arrival/Departure and United Nations...

    Science.gov (United States)

    2013-08-30

    ... waters of the Bronx Kill southeast of the Bronx Kill Rail Road Bridge (mile 0.6) (NAD 1983). (3) Marine... zone on the waters of the East River and Bronx Kill during the arrival and departure of the President... River and Bronx Kill in the vicinity of Randalls and Wards Islands. The RNA is approximately 2,150 yards...

  3. 78 FR 42012 - Safety Zone and Regulated Navigation Area; Chicago Sanitary and Ship Canal, Romeoville, IL

    Science.gov (United States)

    2013-07-15

    ... is issuing this Interim Rule to address two omissions from the regulatory text of the Safety zone and... boats, etc.). This revision is intended to make the regulatory text consistent with the discussion of... of Homeland Security IR Interim Rule NPRM Notice of Proposed Rulemaking RNA Regulated Navigation Area...

  4. Geohydrologic reconnaissance of the upper Potomac River basin

    Science.gov (United States)

    Trainer, Frank W.; Watkins, Frank A.

    1975-01-01

    The upper Potomac River basin, in the central Appalachian region in Pennsylvania, Maryland, Virginia, and West Virginia, is a humid temperate region of diverse fractured rocks. Three geohydrologic terranes, which underlie large parts of the basin, are described in terms of their aquifer characteristics and of the magnitude and duration of their base runoff: (1) fractured rock having a thin regolith, (2) fractured rock having a thick regolith, and (3) carbonate rock. Crystalline rock in the mountainous part of the Blue Ridge province and shale with tight sandstone in the folded Appalachians are covered with thin regolith. Water is stored in and moves through fairly unmodified fractures. Average transmissivity (T) is estimated to be 150 feet squared per day, and average storage coefficient (S), 0.005. Base runoff declines rapidly from its high levels during spring and is poorly sustained during the summer season of high evapotranspiration. The rocks in this geohydrologic terrane are the least effective in the basin for the development of water supplies and as a source of dry-weather streamflow. Crystalline and sedimentary rocks in the Piedmont province and in the lowland part of the Blue Ridge province are covered with thick regolith. Water is stored in and moves through both the regolith and the underlying fractured rock. Estimated average values for aquifer characteristics are T, 200 feet squared per day, and S, 0.01. Base runoff is better sustained in this terrane than in the thin-regolith terrane and on the average .is about twice as great. Carbonate rock, in which fractures have been widened selectively by solution, especially near streams, has estimated average aquifer characteristics of T, 500 feet squared per day, and S, 0.03-0.04. This rock is the most effective in the basin in terms of water supply and base runoff. Where its fractures have not been widened by solution, the carbonate rock is a fractured-rock aquifer much like the noncarbonate rock. At low

  5. Zone separator for multiple zone vessels

    Science.gov (United States)

    Jones, John B.

    1983-02-01

    A solids-gas contact vessel, having two vertically disposed distinct reaction zones, includes a dynamic seal passing solids from an upper to a lower zone and maintaining a gas seal against the transfer of the separate treating gases from one zone to the other, and including a stream of sealing fluid at the seal.

  6. Comparative analysis of military security policy of Norway and Denmark in the Arctic region

    Directory of Open Access Journals (Sweden)

    Igor S. Doroshenko

    2017-01-01

    Full Text Available The interest of Western countries in the Arctic region is growing with each new statement about the sharp climate change and the melting of the Arctic Ocean’s glaciers. In addition to the threats related to the environmental situation in the Arctic zone, the desire to participate in shelf research and development, the potential of using the sea routes of the region by both the Arctic and non-Arctic states creates threats to the security of the Nordic countries.The coastal states, which in case of the escalation of tensions will be in the midst of a regional conflict in the Arctic, are Norway and Denmark. Therefore, the analysis of a level of Norwegian and Danish military security against a backdrop of increasing confrontation between Russia and West and changing climate situation in the region is urgent ., Nevertheless, to ensure a necessary level of defence capability as well as security of borders and zones of exceptional economic interests in the conditions of low temperatures is not so easy. This article examines the Norwegian and Danish approaches to the new military security challenges in the Arctic region. The paper contains examination of the doctrinal basis of military security along with the main documents that form the security concepts of the two countries in the Arctic region, and the reports of the defense ministries and scientific institutions surveys of military activities in the Arctic.Three directions of coastal countries’ policy making in the issues of military security were chosen for comparison. Firstly, the relationships with the USA, the leader of the North Atlantic alliance, which allow us to determine the significance of Norway and Denmark in building NATO security in the north. Secondly, the relationships with the EU and separately with the Nordic countries are considered. This case shows the level of involvement of the European community in the issue of ensuring the Arctic security . Thirdly, the relationships with

  7. Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy

    Science.gov (United States)

    2016-04-01

    swift effects with air strikes; but if the aim is to provide security for populations within a certain zone, prolonged effects may be needed...risking detection and swift decimation. Arms sales or transfers of equipment capable of providing Ukrainian combat formations with technological over...Western military doctrines, see Journal of Strategic Studies, Vol. 38, No. 7, Taylor and Francis, Abingdon, Oxford: UK, December 2015. 11. GAO, Hybrid

  8. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  9. Parapapillary atrophy: histological gamma zone and delta zone.

    Directory of Open Access Journals (Sweden)

    Jost B Jonas

    Full Text Available BACKGROUND: To examine histomorphometrically the parapapillary region in human eyes. METHODOLOGY/PRINCIPAL FINDINGS: The histomorphometric study included 65 human globes (axial length:21-37 mm. On anterior-posterior histological sections, we measured the distance Bruch's membrane end (BME-optic nerve margin ("Gamma zone", BME-retinal pigment epithelium (RPE ("Beta zone", BME-beginning of non-occluded choriocapillaris, and BME-beginning of photoreceptor layer. "Delta zone" was defined as part of gamma zone in which blood vessels of at least 50 µm diameter were not present over a length of >300 µm. Beta zone (mean length:0.35±0.52 mm was significantly (P = 0.01 larger in the glaucoma group than in the non-glaucomatous group. It was not significantly (P = 0.28 associated with axial length. Beta zone was significantly (P = 0.004 larger than the region with occluded choriocapillaris. Gamma zone (mean length:0.63±1.25 mm was associated with axial length (P50 µm diameter within gamma zone was present only in highly axially elongated globes and was not related with glaucoma. Beta zone (Bruch's membrane without RPE was correlated with glaucoma but not with globe elongation. Since the region with occluded choriocapillaris was smaller than beta zone, complete loss of RPE may have occurred before complete choriocapillaris closure.

  10. 75 FR 38019 - Safety Zone; Fixed Mooring Balls, South of Barbers Pt. Harbor Channel, Oahu, HI

    Science.gov (United States)

    2010-07-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0457] RIN 1625-AA00 Safety Zone; Fixed Mooring Balls, South of Barbers Pt. Harbor Channel, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: Due to the placement of six fixed mooring balls in an...

  11. 77 FR 13232 - Security Zones; G8/North Atlantic Treaty Organization (NATO) Summit, Chicago, IL

    Science.gov (United States)

    2012-03-06

    ... political figures, the G8/NATO Summit is expected to draw significant domestic and international media... mitigate the threat of violence and ensure the safety and security of those who attend, participate, and... NATO; the high concentration of dignitaries and political figures; the expected interest of domestic...

  12. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production

    DEFF Research Database (Denmark)

    Coles, Graeme D; Wratten, Stephen D; Porter, John Roy

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively...... and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies....

  13. 75 FR 81854 - Safety Zone; New Year's Celebration for the City of San Francisco, Fireworks Display, San...

    Science.gov (United States)

    2010-12-29

    ... display is for entertainment purposes. From 11 a.m. until 11 p.m. on December 31, 2010, pyrotechnics will... Standards The National Technology Transfer and Advancement Act (NTTAA) (15 U.S.C. 272 note) directs agencies... changing Regulated Navigation Areas and security or safety zones. An environmental analysis checklist and a...

  14. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  15. Selected approaches to determining the purpose of emergency planning zones

    Science.gov (United States)

    Dobeš, Pavel; Baudišová, Barbora; Sluka, Vilém; Skřínský, Jan; Danihelka, Pavel; Dlabka, Jakub; Řeháček, Jakub

    2013-04-01

    One of the major accident hazards (hereinafter referred to as "MAH") tools to determine the range of effects of a major accident and consequent protection of the public is the determination of the emergency planning zone (hereinafter referred to as "zone"). In the Czech Republic, the determination of the zone is regulated by the Decree No. 103/2006 Coll. laying down the principles for determination of the emergency planning zone and the extent and manner of elaborating the external emergency plan (hereinafter referred to as "Decree") 3. The Decree is based on the principles of the IAEA-TECDOC-727 method - Manual for the Classification and Prioritization of Risks Due to Major Accidents in Process and Related Industries (hereinafter referred to as "method" and "manual", respectively)3. In the manual, it is pointed out that the method used is not suitable for making emergency plans for special situations (industrial activities in an inhabited area). Nonetheless, its principles and procedures are still used for such purposes in the Czech Republic. The expert scientific community dealing with MAH issues in the Czech Republic, however, realizes that the procedure of the zone boundary delineation should be modified to reflect up-to-date knowledge in protection of the public and its enhancement. Therefore, the OPTIZON Project (Optimization of the Emergency Planning Zone Designation and Elaboration of Emergency Plans Based on Threatening Effects of Dangerous Chemical Substances at Operational Accidents with Respect to Inhabitant Protection Enhancement) was developed and approved for the Program of Security Research of the Czech Republic 2010 - 2015 (BV II/2-VS). One of the main project's objectives is to define clearly the purpose of the zone because at present it is not quite apparent. From the general view, this step may seem insignificant or trivial, but the reverse is true. It represents one of the most important stages in seeking the approach to the zone designation as

  16. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  17. Venezuela and Energy Security of Latin America

    Directory of Open Access Journals (Sweden)

    Elena Igorevna Vesnovskaya

    2015-12-01

    Full Text Available The article is devoted to the specificity of Venezuela's energy policy and the features of the evolution of its approaches to solving problems of energy security. Special attention is paid to the projects of Caracas in the energy sector which are aimed at the creating of common energy zone in Latin America. The author has revealed the interaction of internal political processes in Venezuela as the country's leader in the region, with its integration policy, and also identified trends in the further development of energy policy and strategy of Latin American countries. The research of energy resources of Latin America determined that the main factor that works in favor of convergence states within the South American "geopolitical ring" is to ensure energy security. Venezuela is among the richest resources of Latin America. In the research it was determined that Petrosur, Petrocaribe and Petroandina provide the basis for a range of bilateral agreements to promote cooperation, creation ventures based on the state oil companies of these states.

  18. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  19. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  20. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  1. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  2. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  3. Radiation protection zoning

    International Nuclear Information System (INIS)

    2015-01-01

    Radiation being not visible, the zoning of an area containing radioactive sources is important in terms of safety. Concerning radiation protection, 2 work zones are defined by regulations: the monitored zone and the controlled zone. The ministerial order of 15 may 2006 settles the frontier between the 2 zones in terms of radiation dose rates, the rules for access and the safety standards in both zones. Radioprotection rules and the name of the person responsible for radiation protection must be displayed. The frontier between the 2 zones must be materialized and marked with adequate equipment (specific danger signs and tapes). Both zones are submitted to selective entrance, the access for the controlled zone is limited because of the radiation risk and of the necessity of confining radioactive contamination while the limitation of the access to the monitored zone is due to radiation risk only. (A.C.)

  4. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  5. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  6. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  7. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  8. Mechanisms for efficient investments and optimal zones in regional power market

    Directory of Open Access Journals (Sweden)

    Andročec Ivan

    2014-01-01

    Full Text Available The paper is result of research different cross-border electricity trading mechanisms impact. Focus is on investments in generation and transmission power system facilities in regional market. Assumptions include efficient market coupling mechanism (with more bidding zones, use of additional investment indicators (like social welfare and congestion cost and security of supply issues (capacity mechanisms. There is discussion on cost benefits analysis for particular market participants and there is possibility of risk reduction for regional power system expansion. It is shown current state-of-the-art, problems and trends in solving some aspects of market integration and investment issues. In some cases smaller and well defined bidding areas are absolutely essential in order to ensure system security and economic efficiency. There is no single criterion for power system expansion but it is possible to use combination of incentive schemes and possible through one index for cross-border trade. Risk management for cross-border electricity trading through several areas needs to be upgraded with use of financial transmission rights like weighted average area prices, respectively. Regional power system security is closely associated with timely investments in energy supply in line with economic development and environmental needs. Security of supply indicator is deriving an estimation of security of supply improvement from the market based simulation results when a generation or transmission investment project is implemented. All researched makes market integration and investments in Europe more efficient and gives more correct signals to market participants in regional market.

  9. Regional Integrated Tenets to Reinforce the Safety and Security of Radioactive Sources (ClearZone)

    International Nuclear Information System (INIS)

    Salzer, P.

    2003-01-01

    The EURATOM Research and Training Programme on Nuclear Energy includes 2 main fields - fusion energy research and management of radioactive waste, radiation protection and other activities of nuclear technology and safety.Seven instruments (mechanisms) for projects management are used - 'Network of Excellence' (NOE); 'Integrated Project' (IP); 'Specific Targeted Research Project' or 'Specific Targeted Training Project' (STREP); 'Co-ordination Action' (CA); Actions to Promote and Develop Human Resources and Mobility Specific Support Actions; Integrated Infrastructure Initiatives. Two consecutive sub-projects are proposed: 'small' - countries of the Visegrad four + Austrian participant -within the 6th FP 'Specific Supported Actions' and 'large' - participation of more countries in the region - more oriented to practical implementation of the 'small' project findings - intention to use the 6th Framework Programme resources to co-financing the implementation activities. The main objectives are: to create effective lines of defense (prevention -detection - categorization - transport - storage) against malicious use of radioactive sources; to achieve and maintain a high level of safety and security of radioactive sources; to arise the radioactive sources management safety and security culture at the Central European region. Consortium of 11 organisations from Czech Republic, Slovak Republic, Austria, Hungary and Poland is established for the Project implementation. The Project task are grouped in the following areas: legislation, infrastructure, practices; metallurgical industry, cross border control; instrumentation and metrology; information system

  10. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  11. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  12. 75 FR 70126 - Safety Zone; Fireworks Displays, Potomac River, National Harbor, MD

    Science.gov (United States)

    2010-11-17

    ... of docket USCG-2010-0776 and are available online by going to http://www.regulations.gov , inserting... Guard received a total of one piece of correspondence in response to the temporary interim rule. No...

  13. 75 FR 41376 - Safety Zone; Fireworks Display, Potomac River, Charles County, MD

    Science.gov (United States)

    2010-07-16

    ... the docket, call Renee V. Wright, Program Manager, Docket Operations, telephone 202-366-9826... east of the pierhead at Tim's Rivershore Restaurant in Dumfries, Virginia (NAD 1983). The temporary... standards are technical standards (e.g., specifications of materials, performance, design, or operation...

  14. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  15. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  16. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  17. Reproductive health of bass in the potomac, USA, drainage: part 2. Seasonal occurrence of persistent and emerging organic contaminants

    Science.gov (United States)

    Alvarez, D.A.; Cranor, W.L.; Perkins, S.D.; Schroeder, V.L.; Iwanowicz, L.R.; Clark, R.C.; Guy, C.P.; Pinkney, A.E.; Blazer, V.S.; Mullican, J.E.

    2009-01-01

    The seasonal occurrence of organic contaminants, many of which are potential endocrine disruptors, entering the Potomac River, USA, watershed was investigated using a two-pronged approach during the fall of 2005 and spring of 2006. Passive samplers (semipermeable membrane device and polar organic chemical integrative sampler [POCIS]) were deployed in tandem at sites above and below wastewater treatment plant discharges within the watershed. Analysis of the samplers resulted in detection of 84 of 138 targeted chemicals. The agricultural pesticides atrazine and metolachlor had the greatest seasonal changes in water concentrations, with a 3.1 - to 91 -fold increase in the spring compared with the level in the previous fall. Coinciding with the elevated concentrations of atrazine in the spring were increasing concentrations of the atrazine degradation products desethylatrazine and desisopropylatrazine in the fall following spring and summer application of the parent compound. Other targeted chemicals (organochlorine pesticides, polycyclic aromatic hydrocarbons, and organic wastewater chemicals) did not indicate seasonal changes in occurrence or concentration; however, the overall concentrations and number of chemicals present were greater at the sites downstream of wastewater treatment plant discharges. Several fragrances and flame retardants were identified in these downstream sites, which are characteristic of wastewater effluent and human activities. The bioluminescent yeast estrogen screen in vitro assay of the POCIS extracts indicated the presence of chemicals that were capable of producing an estrogenic response at all sampling sites. ?? 2009 SETA.

  18. Fuel conditioning facility zone-to-zone transfer administrative controls

    International Nuclear Information System (INIS)

    Pope, C. L.

    2000-01-01

    The administrative controls associated with transferring containers from one criticality hazard control zone to another in the Argonne National Laboratory (ANL) Fuel Conditioning Facility (FCF) are described. FCF, located at the ANL-West site near Idaho Falls, Idaho, is used to remotely process spent sodium bonded metallic fuel for disposition. The process involves nearly forty widely varying material forms and types, over fifty specific use container types, and over thirty distinct zones where work activities occur. During 1999, over five thousand transfers from one zone to another were conducted. Limits are placed on mass, material form and type, and container types for each zone. Ml material and containers are tracked using the Mass Tracking System (MTG). The MTG uses an Oracle database and numerous applications to manage the database. The database stores information specific to the process, including material composition and mass, container identification number and mass, transfer history, and the operators involved in each transfer. The process is controlled using written procedures which specify the zone, containers, and material involved in a task. Transferring a container from one zone to another is called a zone-to-zone transfer (ZZT). ZZTs consist of four distinct phases, select, request, identify, and completion

  19. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  20. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  1. Enhancement of security using structured phase masked in optical image encryption on Fresnel transform domain

    Science.gov (United States)

    Yadav, Poonam Lata; Singh, Hukum

    2018-05-01

    To enhance the security in optical image encryption system and to protect it from the attackers, this paper proposes new digital spiral phase mask based on Fresnel Transform. In this cryptosystem the Spiral Phase Mask (SPM) used is a hybrid of Fresnel Zone Plate (FZP) and Radial Hilbert Mask (RHM) which makes the key strong and enhances the security. The different keys used for encryption and decryption purposed make the system much more secure. Proposed scheme uses various structured phase mask which increases the key space also it increases the number of parameters which makes it difficult for the attackers to exactly find the key to recover the original image. We have also used different keys for encryption and decryption purpose to make the system much more secure. The strength of the proposed cryptosystem has been analyzed by simulating on MATLAB 7.9.0(R2008a). Mean Square Errors (MSE) and Peak Signal to Noise Ratio (PSNR) are calculated for the proposed algorithm. The experimental results are provided to highlight the effectiveness and sustainability of proposed cryptosystem and to prove that the cryptosystem is secure for usage.

  2. Molecular differences in transition zone and peripheral zone prostate tumors

    Science.gov (United States)

    Sinnott, Jennifer A.; Rider, Jennifer R.; Carlsson, Jessica; Gerke, Travis; Tyekucheva, Svitlana; Penney, Kathryn L.; Sesso, Howard D.; Loda, Massimo; Fall, Katja; Stampfer, Meir J.; Mucci, Lorelei A.; Pawitan, Yudi; Andersson, Sven-Olof; Andrén, Ove

    2015-01-01

    Prostate tumors arise primarily in the peripheral zone (PZ) of the prostate, but 20–30% arise in the transition zone (TZ). Zone of origin may have prognostic value or reflect distinct molecular subtypes; however, it can be difficult to determine in practice. Using whole-genome gene expression, we built a signature of zone using normal tissue from five individuals and found that it successfully classified nine tumors of known zone. Hypothesizing that this signature captures tumor zone of origin, we assessed its relationship with clinical factors among 369 tumors of unknown zone from radical prostatectomies (RPs) and found that tumors that molecularly resembled TZ tumors showed lower mortality (P = 0.09) that was explained by lower Gleason scores (P = 0.009). We further applied the signature to an earlier study of 88 RP and 333 transurethral resection of the prostate (TURP) tumor samples, also of unknown zone, with gene expression on ~6000 genes. We had observed previously substantial expression differences between RP and TURP specimens, and hypothesized that this might be because RPs capture primarily PZ tumors, whereas TURPs capture more TZ tumors. Our signature distinguished these two groups, with an area under the receiver operating characteristic curve of 87% (P zones. Zone of origin may be important to consider in prostate tumor biomarker research. PMID:25870172

  3. Crimea and the quest for energy and military hegemony in the Black Sea region: governance gap in a contested geostrategic zone

    NARCIS (Netherlands)

    Blockmans, S.

    2015-01-01

    Russia’s annexation of Crimea and its destabilization of Eastern Ukraine have radically altered the European security order, with the Black Sea region becoming an acutely contested geostrategic zone. Russia’s strategic interests in the Black Sea region, especially in terms of energy and military

  4. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. 75 FR 65232 - Security Zones; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX

    Science.gov (United States)

    2010-10-22

    ... Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and does not create an environmental risk to health or risk to safety that may disproportionately affect children... for which the Captain of the Port, Port Arthur deems enhanced security measures necessary. In addition...

  6. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  7. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  8. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  9. Danger Zones Dead Ahead For The U.S. And China: Prospects And Challenges

    OpenAIRE

    Linnea B. McCord; Terry Young; Peggy J. Crawford

    2013-01-01

    To be successful and remain independent, every country must create a prosperous economy, keep peace among its people, maintain political stability, and ensure the security of the people and the country from internal and external threats. Doing all four at the same time is never easy and in a time of economic volatility, change, and uncertainty juggling all four becomes more difficult. This is when countries enter the danger zone where hidden cracks and fissures in a countrys organization an...

  10. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  11. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  12. The Houston Ship Channel security: a case study

    Science.gov (United States)

    Le, Han Q.; Bellamy, P. A.; Pei, S. S. S.

    2007-04-01

    The Houston Ship Channel (HSC) is a 50-mile long shipping channel that contains many private ports including the Port of Houston Authority. It has a uniquely critical role with respect to the US petroleum energy supply. The HSC security is currently planned for significant enhancement under the auspices of the Harris County and the Houston-based Port Strategic Security Council. The ultimate objective is to comprehensively address the HSC threat matrix. This paper describes the technical effort in support of this program. The HSC security is a complex system of systems that includes the physical control access system, the command, control, communication, and information (C4I) system, and the telecom infrastructure. The strategy is to coordinate the improvements of different components to achieve a high-impact net effectiveness. A key element is a planned high-capacity backbone optical network for integrating the C4I of many different HSC administrative-jurisdictional authorities, which will allow unified situational awareness for a more effective cooperation and coordination. Enhancement of surveillance and intrusion protection is crucial. A feasibility study was conducted for the HSC assuming common surveillance technologies including visible/IR camera, radar, and sonar. The method includes survey and theoretical modeling to detect threats of concern in the HSC natural environment. The result indicates that the HSC unique river-like geography offers both advantages and challenges. The narrow channel allows ease of waterside surveillance, but likely incurs high cost for its great length. In addition, landside security is also important owing to its location amidst urban-industrial zone. Lastly, limitation of the various technologies is discussed by considering the broader challenges of the intrusion problem.

  13. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  14. WorkZoneQ user guide for two-lane freeway work zones.

    Science.gov (United States)

    2013-06-01

    WorkZoneQ was developed in Visual Basic for Applications (VBA) to implement the results of the previous study, : Queue and Users Costs in Highway Work Zones. This report contains the WorkZoneQ user guide. WorkZoneQ : consists of eight Excel ...

  15. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  16. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  17. ZoneLib

    DEFF Research Database (Denmark)

    Jessen, Jan Jacob; Schiøler, Henrik

    2006-01-01

    We present a dynamic model for climate in a livestock building divided into a number of zones, and a corresponding modular Simulink library (ZoneLib). While most literature in this area consider air flow as a control parameter we show how to model climate dynamics using actual control signals...... development of ZoneLib....

  18. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  19. 33 CFR 165.T09-1080 - Safety Zone and Regulated Navigation Area, Chicago Sanitary and Ship Canal, Romeoville, IL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety Zone and Regulated Navigation Area, Chicago Sanitary and Ship Canal, Romeoville, IL. 165.T09-1080 Section 165.T09-1080 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS AND LIMITED...

  20. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  1. THE BUSINESS OF THE CANAL: THE ECONOMICS AND POLITICS OF THE CARTER ADMINISTRATION’S PANAMA CANAL ZONE INITIATIVE, 1978

    Directory of Open Access Journals (Sweden)

    Mary C. Swilling

    2004-01-01

    Full Text Available The Carter-Torrijos Treaty of 1978, the initiative to relinquish controi of the Panama Canal Zone to the Republic of Panama, allowed Panama for the first time in its short history to become an autonomous nation and to take control of its destiny as a global trading crossroads. Conservatives rallied against President Carter and accused him of jeopardizing U. S. security and hegemony. Fears were that Panama did not have the economic or technical resources to maintain Canal operations, lacked the administrative knowledge and resources to manage the business of the Canal, lacked the military presence to insure security of the Canal, and did not have the political and social will to maintain the environmental integrity of the region. In short, disastrous results were predicted. Carter prevailed. December 31, 1999 saw the surrender of the Canal Zone, and all its facilities, to Panama. This paper discusses events that precipitated Carter’s decision, economic and political arguments presented during the 1977-78 debate, implementation of the treaty, and an evaluation of the ‘business of the Canal’ today.

  2. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  3. 33 CFR 165.760 - Security Zones; Tampa Bay, Port of Tampa, Port of Saint Petersburg, Port Manatee, Rattlesnake...

    Science.gov (United States)

    2010-07-01

    ..., 200 yards around vessels moored in Tampa Bay carrying or transferring Liquefied Petroleum Gas (LPG... outer 100 yards of the zone for moored vessels carrying or transferring Liquefied Petroleum Gas (LPG...

  4. Empowerment Zones and Enterprise Districts - MDC_EnterpriseZone

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Polygon feature class of Miami Dade County Enterprise Zones. Enterprise Zones are special areas in the county where certain incentives from the State are available...

  5. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  6. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  7. [Airport security check of medical substances used during patient repatriation].

    Science.gov (United States)

    Felkai, Péter

    2012-09-16

    During airport security check of passenger luggage, hazardous items and substances are prohibited to be taken into the restricted safety zone of the airport and the aircraft. Among equipment of the medical staff escorting the patient, there are several devices and materials which are considered hazardous for security reasons. However, medical equipment and substances are indispensable for treating patients during the flight. The aim of the author was to present his experience obtained with the use of an instrument developed for testing liquids, aerosols and gels for security reasons. An instrument based on Raman spectroscopy was used for the identification of medical substances. The results confirmed that the instrument was able to recognize the tested medical substances. The non-destructive testing maintained sample integrity and asepsis. The data indicate that the instrument has a promising utility for the identification of medical substances. It seems important that during repatriation medical substances should be selected not only on the ground of their medical necessity, but their packaging should be also taken into consideration. It is necessary to perform more tests on different medical substances used in emergency care in order to make the database of medical substances stored in the library of instrument more complete.

  8. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  9. μRTZVisor: A Secure and Safe Real-Time Hypervisor

    Directory of Open Access Journals (Sweden)

    José Martins

    2017-10-01

    Full Text Available Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. Microkernel-based approaches to virtualization have been shown to bridge the gap between traditional and embedded virtualization. This notwithstanding, existent microkernel-based solutions follow a highly para-virtualized approach, which inherently requires a significant software engineering effort to adapt guest operating systems (OSes to run as userland components. In this paper, we present μ RTZVisor as a new TrustZone-assisted hypervisor that distinguishes itself from state-of-the-art TrustZone solutions by implementing a microkernel-like architecture while following an object-oriented approach. Contrarily to existing microkernel-based solutions, μ RTZVisor is able to run nearly unmodified guest OSes, while, contrarily to existing TrustZone-assisted solutions, it provides a high degree of functionality and configurability, placing strong emphasis on the real-time support. Our hypervisor was deployed and evaluated on a Xilinx Zynq-based platform. Experiments demonstrate that the hypervisor presents a small trusted computing base size (approximately 60KB, and a performance overhead of less than 2% for a 10 ms guest-switching rate.

  10. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  11. Slip Zone versus Damage Zone Micromechanics, Arima-Takasuki Tectonic Line, Japan

    Science.gov (United States)

    White, J. C.; Lin, A.

    2017-12-01

    The Arima-Takasuki Tectonic Line (ATTL) of southern Honshu, Japan is defined by historically active faults and multiple splays producing M7 earthquakes. The damage zone of the ATTL comprises a broad zone of crushed, comminuted and pulverized granite/rhyolite1,2containing cm-scale slip zones and highly comminuted injection veins. In this presentation, prior work on the ATTL fault rocks is extending to include microstructural characterization by transmission electron microscopy (TEM) from recent trenching of the primary slip zone, as well as secondary slip zones. This is necessary to adequately characterize the extremely fine-grained material (typically less than 1mm) in both damage and core zones. Damage zone material exhibits generally random textures3 whereas slip zones are macroscopically foliated, and compositionally layered, notwithstanding a fairly homogeneous protolith. The latter reflects fluid-rock interaction during both coseismic and interseismic periods. The slip zones are microstructurally heterogeneous at all scales, comprising not only cataclasites and phyllosilicate (clay)-rich gouge zones, but Fe/Mn pellets or clasts that are contained within gouge. These structures appear to have rolled and would suggest rapid recrystallization and/or growth. A central question related to earthquake recurrence along existing faults is the nature of the gouge. In both near-surface exposures and ongoing drilling at depth, "plastic" or "viscous" gouge zones comprise ultra-fine-grained clay-siliciclastic particles that would not necessarily respond in a simple frictional manner. Depending on whether the plastic nature of these slip zones develops during or after slip, subsequent focusing of slip within them could be complicated. 1 Mitchell, T.A., Ben-Zion, Y., Shimamoto, T., 2011. Ear. Planet. Sci. Lett. 308, 284-297. 2 Lin, A., Yamashita, K, Tanaka, M. J., 2013. Struc. Geol. 48, 3-13. 3 White, J.C., Lin, A. 2016. Proc. AGU Fall Mtg., T42-02 San Francisco.

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  14. Evaluation of Ohio work zone speed zones process.

    Science.gov (United States)

    2014-06-01

    This report describes the methodology and results of analyses performed to determine the effectiveness of Ohio Department of Transportation processes for establishing work zone speed zones. Researchers observed motorists speed choice upstream of a...

  15. Assessing and comparing information security in swiss hospitals.

    Science.gov (United States)

    Landolt, Sarah; Hirschel, Jürg; Schlienger, Thomas; Businger, Walter; Zbinden, Alex M

    2012-11-07

    Availability of information in hospitals is an important prerequisite for good service. Significant resources have been invested to improve the availability of information, but it is also vital that the security of this information can be guaranteed. The goal of this study was to assess information security in hospitals through a questionnaire based on the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) standard ISO/IEC 27002, evaluating Information technology - Security techniques - Code of practice for information-security management, with a special focus on the effect of the hospitals' size and type. The survey, set up as a cross-sectional study, was conducted in January 2011. The chief information officers (CIOs) of 112 hospitals in German-speaking Switzerland were invited to participate. The online questionnaire was designed to be fast and easy to complete to maximize participation. To group the analyzed controls of the ISO/IEC standard 27002 in a meaningful way, a factor analysis was performed. A linear score from 0 (not implemented) to 3 (fully implemented) was introduced. The scores of the hospitals were then analyzed for significant differences in any of the factors with respect to size and type of hospital. The participating hospitals were offered a benchmark report about their status. The 51 participating hospitals had an average score of 51.1% (range 30.6% - 81.9%) out of a possible 100% where all items in the questionnaire were fully implemented. Room for improvement could be identified, especially for the factors covering "process and quality management" (average score 1.3 ± 0.8 out of a maximum of 3) and "organization and risk management" (average score 1.3 ± 0.7 out of a maximum of 3). Private hospitals scored significantly higher than university hospitals in the implementation of "security zones" and "backup" (P = .008). Half (50.00%, 8588/17,177) of all assessed hospital beds

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  18. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  19. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  20. Color Fundus Photography versus Fluorescein Angiography in Identification of the Macular Center and Zone in Retinopathy of Prematurity

    Science.gov (United States)

    Patel, Samir N.; Klufas, Michael A.; Ryan, Michael C.; Jonas, Karyn E.; Ostmo, Susan; Martinez-Castellanos, Maria Ana; Berrocal, Audina M.; Chiang, Michael F.; Chan, R.V. Paul

    2016-01-01

    Purpose To examine the utility of fluorescein angiography (FA) in identification of the macular center and the diagnosis of zone in patients with retinopathy of prematurity (ROP). Design Validity and reliability analysis of diagnostic tools Methods 32 sets (16 color fundus photographs; 16 color fundus photographs paired with the corresponding FA) of wide-angle retinal images obtained from 16 eyes of eight infants with ROP were compiled on a secure web site. 9 ROP experts (3 pediatric ophthalmologists; 6 vitreoretinal surgeons) participated in the study. For each image set, experts identified the macular center and provided a diagnosis of zone. Main Outcome Measures (1) Sensitivity and specificity of zone diagnosis (2) “Computer facilitated diagnosis of zone,” based on precise measurement of the macular center, optic disc center, and peripheral ROP. Results Computer facilitated diagnosis of zone agreed with the expert’s diagnosis of zone in 28/45 (62%) cases using color fundus photographs and in 31/45 (69%) cases using FA. Mean (95% CI) sensitivity for detection of zone I by experts as compared to a consensus reference standard diagnosis when interpreting the color fundus images alone versus interpreting the color fundus photographs and FA was 47% (35.3% – 59.3%) and 61.1% (48.9% – 72.4%), respectively, (t(9) ≥ (2.063), p = 0.073). Conclusions There is a marginally significant difference in zone diagnosis when using color fundus photographs compared to using color fundus photographs and the corresponding fluorescein angiograms. There is inconsistency between traditional zone diagnosis (based on ophthalmoscopic exam and image review) compared to a computer-facilitated diagnosis of zone. PMID:25637180

  1. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  2. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  3. An analysis of the transient's social behavior in the radiological emergency planning zone

    International Nuclear Information System (INIS)

    Bang, Sun Young; Lee, Gab Bock; Chung, Yang Geun; Lee, Jae Eun

    2007-01-01

    The purpose of this study is to analyze the social behavior, especially, the evacuation-related social behavior, of the transients in the radiological Emergency Planning Zone (EPZ) of nuclear power plants. So, the meaning and kinds of the evacuation and the significance of the Trip Generation Time (TGT) have been reviewed. The characteristics of the social behavior of the transient around Ulchin, Wolsong and Kori sites was analyzed through field surveys by using the questionnaire. The major findings of this research implications are as follows. First, for securing the safe evacuation, the alternatives to effectively provide the information on the evacuation warning may be prepared. Second, it is necessary to establish the education and training of transient's evacuation. Third, it is needed that the cause and background of the evacuation refusal are identified and the new response plan to secure transient's safety is prepared

  4. Optical image encryption using fresnel zone plate mask based on fast walsh hadamard transform

    Science.gov (United States)

    Khurana, Mehak; Singh, Hukum

    2018-05-01

    A new symmetric encryption technique using Fresnel Zone Plate (FZP) based on Fast Walsh Hadamard Transform (FWHT) is proposed for security enhancement. In this technique, bits of plain image is randomized by shuffling the bits randomly. The obtained scrambled image is then masked with FZP using symmetric encryption in FWHT domain to obtain final encrypted image. FWHT has been used in the cryptosystem so as to protect image data from the quantization error and for reconstructing the image perfectly. The FZP used in proposed scheme increases the key space and makes it robust to many traditional attacks. The effectiveness and robustness of the proposed cryptosystem has been analyzed on the basis of various parameters by simulating on MATLAB 8.1.0 (R2012b). The experimental results are provided to highlight suitability of the proposed cryptosystem and prove that the system is secure.

  5. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  6. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  7. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  8. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  9. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  10. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  11. National Biological Service Research Supports Watershed Planning

    Science.gov (United States)

    Snyder, Craig D.

    1996-01-01

    The National Biological Service's Leetown Science Center is investigating how human impacts on watershed, riparian, and in-stream habitats affect fish communities. The research will provide the basis for a Ridge and Valley model that will allow resource managers to accurately predict and effectively mitigate human impacts on water quality. The study takes place in the Opequon Creek drainage basin of West Virginia. A fourth-order tributary of the Potomac, the basin falls within the Ridge and Valley. The study will identify biological components sensitive to land use patterns and the condition of the riparian zone; the effect of stream size, location, and other characteristics on fish communities; the extent to which remote sensing can reliable measure the riparian zone; and the relationship between the rate of landscape change and the structure of fish communities.

  12. Security Implications of Physical Design Attributes in the Emergency Department.

    Science.gov (United States)

    Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E

    2016-07-01

    Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.

  13. SYSTEMATIZATION OF INTERNATIONAL EXPERIENCE OF ENSURING ECONOMIC SECURITY OF EXACERBATION OF THE THREATS AND CHALLENGES OF A NEW TYPE FOR NATIONAL AND INTERNATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Tatyana Momot

    2016-11-01

    Full Text Available The aim of the work is to systematize the international experience of economic security both in terms of individual countries and the global economy as a whole. Setting such a goal it is associated with the growth of globalization and integration processes in the world economy, which are the new threat of economic security. Methods. Theoretical and methodological basis of the study were research and findings on issues of economic security at the level of the world economy as a whole and individual national economies in particular. We used such general scientific and special methods, such as analysis and synthesis, comparison, generalization, adaptation. The findings led to the conclusion that the protection of national interests and the formation of an economic security strategy – the most important functions of the state, the implementation of which is impossible without a system of self-regulation mechanisms and regulation. The government should implement a set of measures to promote economic growth, and that will guarantee the economic security of the country. These measures should cover all sectors of the economy. These measures include the implementation an active structural and social policies, enhancing the activity of the state in investment, financial, monetary and foreign economic sphere, the continuation of institutional reforms. The practical significance is to separate the differences used methodological approaches to ensure the economic security of the EU member countries and the CIS. This is explained by the fact that the first group of countries is focused on standards and borrows the experience of the leading EU countries (Germany, France, and the second group, located in the zone of influence of Russia (Moldova, Ukraine, Belarus, Kazakhstan, – on the Russian developments and standards. In turn, Russia in their design focuses more on standards to ensure economic security, which have been made in the period of the Soviet

  14. iFLOOD: A Real Time Flood Forecast System for Total Water Modeling in the National Capital Region

    Science.gov (United States)

    Sumi, S. J.; Ferreira, C.

    2017-12-01

    Extreme flood events are the costliest natural hazards impacting the US and frequently cause extensive damages to infrastructure, disruption to economy and loss of lives. In 2016, Hurricane Matthew brought severe damage to South Carolina and demonstrated the importance of accurate flood hazard predictions that requires the integration of riverine and coastal model forecasts for total water prediction in coastal and tidal areas. The National Weather Service (NWS) and the National Ocean Service (NOS) provide flood forecasts for almost the entire US, still there are service-gap areas in tidal regions where no official flood forecast is available. The National capital region is vulnerable to multi-flood hazards including high flows from annual inland precipitation events and surge driven coastal inundation along the tidal Potomac River. Predicting flood levels on such tidal areas in river-estuarine zone is extremely challenging. The main objective of this study is to develop the next generation of flood forecast systems capable of providing accurate and timely information to support emergency management and response in areas impacted by multi-flood hazards. This forecast system is capable of simulating flood levels in the Potomac and Anacostia River incorporating the effects of riverine flooding from the upstream basins, urban storm water and tidal oscillations from the Chesapeake Bay. Flood forecast models developed so far have been using riverine data to simulate water levels for Potomac River. Therefore, the idea is to use forecasted storm surge data from a coastal model as boundary condition of this system. Final output of this validated model will capture the water behavior in river-estuary transition zone far better than the one with riverine data only. The challenge for this iFLOOD forecast system is to understand the complex dynamics of multi-flood hazards caused by storm surges, riverine flow, tidal oscillation and urban storm water. Automated system

  15. Cenozoic stratigraphy and structure of the Chesapeake Bay region

    Science.gov (United States)

    Powars, David S.; Edwards, Lucy E.; Kidwell, Susan M.; Schindler, J. Stephen

    2015-01-01

    The Salisbury embayment is a broad tectonic downwarp that is filled by generally seaward-thickening, wedge-shaped deposits of the central Atlantic Coastal Plain. Our two-day field trip will take us to the western side of this embayment from the Fall Zone in Washington, D.C., to some of the bluffs along Aquia Creek and the Potomac River in Virginia, and then to the Calvert Cliffs on the western shore of the Chesapeake Bay. We will see fluvial-deltaic Cretaceous deposits of the Potomac Formation. We will then focus on Cenozoic marine deposits. Transgressive and highstand deposits are stacked upon each other with unconformities separating them; rarely are regressive or lowstand deposits preserved. The Paleocene and Eocene shallow shelf deposits consist of glauconitic, silty sands that contain varying amounts of marine shells. The Miocene shallow shelf deposits consist of diatomaceous silts and silty and shelly sands. The lithology, thickness, dip, preservation, and distribution of the succession of coastal plain sediments that were deposited in our field-trip area are, to a great extent, structurally controlled. Surficial and subsurface mapping using numerous continuous cores, auger holes, water-well data, and seismic surveys has documented some folds and numerous high-angle reverse and normal faults that offset Cretaceous and Cenozoic deposits. Many of these structures are rooted in early Mesozoic and/or Paleozoic NE-trending regional tectonic fault systems that underlie the Atlantic Coastal Plain. On Day 1, we will focus on two fault systems (stops 1–2; Stafford fault system and the Skinkers Neck–Brandywine fault system and their constituent fault zones and faults). We will then see (stops 3–5) a few of the remaining exposures of largely unlithified marine Paleocene and Eocene strata along the Virginia side of the Potomac River including the Paleocene-Eocene Thermal Maximum boundary clay. These exposures are capped by fluvial-estuarine Pleistocene terrace

  16. COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-01-01

    Full Text Available The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information support and socio-economic security monitoring of the Arctic regions of Russia. The distinctive features of the investigated system class are openness, self-organization, decentralization of management functions and decision-making, weak hierarchy in the decision-making circuit and goal generation capability inside itself. Research techniques include functional-target approach, mathematical apparatus of multilevel hierarchical system theory and principles of network-centric control of distributed systems with pro-active components and variable structure. The work considers network-centric management local decisions coordination problem-solving within the multilevel distributed systems intended for information support of regional security. The coordination problem-solving approach and problem formalization in the multilevel network-centric control systems of regional security have been proposed based on developed multilevel recurrent hierarchical model of regional socio-economic system complex security. The model provides coordination of regional security indexes, optimized by the different elements of multilevel control systems, subject to decentralized decision-making. The model specificity consists in application of functional-target technology and mathematical apparatus of multilevel hierarchical system theory for coordination procedures implementation of the network-centric management local decisions. The work-out and research results can find further

  17. Fault zone hydrogeology

    Science.gov (United States)

    Bense, V. F.; Gleeson, T.; Loveless, S. E.; Bour, O.; Scibek, J.

    2013-12-01

    Deformation along faults in the shallow crust (research effort of structural geologists and hydrogeologists. However, we find that these disciplines often use different methods with little interaction between them. In this review, we document the current multi-disciplinary understanding of fault zone hydrogeology. We discuss surface- and subsurface observations from diverse rock types from unlithified and lithified clastic sediments through to carbonate, crystalline, and volcanic rocks. For each rock type, we evaluate geological deformation mechanisms, hydrogeologic observations and conceptual models of fault zone hydrogeology. Outcrop observations indicate that fault zones commonly have a permeability structure suggesting they should act as complex conduit-barrier systems in which along-fault flow is encouraged and across-fault flow is impeded. Hydrogeological observations of fault zones reported in the literature show a broad qualitative agreement with outcrop-based conceptual models of fault zone hydrogeology. Nevertheless, the specific impact of a particular fault permeability structure on fault zone hydrogeology can only be assessed when the hydrogeological context of the fault zone is considered and not from outcrop observations alone. To gain a more integrated, comprehensive understanding of fault zone hydrogeology, we foresee numerous synergistic opportunities and challenges for the discipline of structural geology and hydrogeology to co-evolve and address remaining challenges by co-locating study areas, sharing approaches and fusing data, developing conceptual models from hydrogeologic data, numerical modeling, and training interdisciplinary scientists.

  18. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  19. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  20. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  1. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  2. Reproductive health of bass in the Potomac, U.S.A., drainage: part 2. Seasonal occurrence of persistent and emerging organic contaminants.

    Science.gov (United States)

    Alvarez, David A; Cranor, Walter L; Perkins, Stephanie D; Schroeder, Vickie L; Iwanowicz, Luke R; Clark, Randal C; Guy, Christopher P; Pinkney, Alfred E; Blazer, Vicki S; Mullican, John E

    2009-05-01

    The seasonal occurrence of organic contaminants, many of which are potential endocrine disruptors, entering the Potomac River, USA, watershed was investigated using a two-pronged approach during the fall of 2005 and spring of 2006. Passive samplers (semipermeable membrane device and polar organic chemical integrative sampler [POCIS]) were deployed in tandem at sites above and below wastewater treatment plant discharges within the watershed. Analysis of the samplers resulted in detection of 84 of 138 targeted chemicals. The agricultural pesticides atrazine and metolachlor had the greatest seasonal changes in water concentrations, with a 3.1- to 91-fold increase in the spring compared with the level in the previous fall. Coinciding with the elevated concentrations of atrazine in the spring were increasing concentrations of the atrazine degradation products desethylatrazine and desisopropylatrazine in the fall following spring and summer application of the parent compound. Other targeted chemicals (organochlorine pesticides, polycyclic aromatic hydrocarbons, and organic wastewater chemicals) did not indicate seasonal changes in occurrence or concentration; however, the overall concentrations and number of chemicals present were greater at the sites downstream of wastewater treatment plant discharges. Several fragrances and flame retardants were identified in these downstream sites, which are characteristic of wastewater effluent and human activities. The bioluminescent yeast estrogen screen in vitro assay of the POCIS extracts indicated the presence of chemicals that were capable of producing an estrogenic response at all sampling sites.

  3. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  4. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  5. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  6. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  7. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  8. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  9. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  10. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  11. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  12. Handling of the demilitarized zone using service providers in SAP

    Science.gov (United States)

    Iovan, A.; Robu, R.

    2016-02-01

    External collaboration needs to allow data access from the Internet. In a trusted Internet collaboration scenario where the external user works on the same data like the internal user direct access to the data in the Intranet is required. The paper presents a solution to get access to certain data in the Enterprise Resource Planning system, having the User Interface on a system in the Demilitarized Zone and the database on a system which is located in the trusted area. Using the Service Provider Interface framework, connections between separate systems can be created in different areas of the network. The paper demonstrates how to connect the two systems, one in the Demilitarized Zone and one in the trusted area, using SAP ERP 6.0 with Enhancement Package 7. In order to use the Service Provider Interface SAP Business Suite Foundation component must be installed in both systems. The advantage of using the Service Provider Interface framework is that the external user works on the same data like the internal user (and not on copies). This assures data consistency and less overhead for backup and security systems.

  13. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  14. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  15. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  16. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  17. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  19. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  20. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  1. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  2. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  3. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  4. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  5. International cooperation and security in the field of nuclear energy in Armenia

    International Nuclear Information System (INIS)

    Khachatryan, D.A.; Avagyan, A.A.; Stepanyan, V.E.

    2010-01-01

    In the report presented/discussed are the ecological-humanitarian disasters and the related policy of the international organizations, especially IAEA, NATO and others on ensuring security of vital activity of people in the sphere of energy and particularly nuclear energy. Possessing the only nuclear power station in Trans Caucasus and the store of toxic wastes of reactive fuel the Government of Armenia and the Ministry of Emergency Situations of the Republic of Armenia always take into consideration the many-sided aspects of prevention, warning about accident in energy buildings including nuclear accidents and modern response in case of occurring the latter ensuring security for ANPP personnel and the inhabitants of the settlements of the possible contingency zone. In their daily activity the workers of the Emergency Situations of the Republic of Armenia, especially those of the Armenian Rescue Service base on the experience and logistic support of international community some aspects of which are presented below

  6. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  7. Security environment and nuclear proliferation problems in East Asia

    International Nuclear Information System (INIS)

    Suh, Mark Byung-Moon

    1997-01-01

    East Asia was and still is divided into two conflicting ideological blocs. Because of the Cold War between these two blocs, two international wars were fought and tensions limited interactions among these countries. Despite these political constraints, in recent years East Asia has become economically one of the most dynamic regions in the world. Now that the Cold War between the USA and the Soviet Union is over, the danger of global nuclear war involving the nuclear powers in the region has been practically eliminated. Nonetheless, security has become more complex and demands a whole new set of arrangements. Yet the region lacks a cohesive multilateral framework for conflict resolution, and only recently have various attempts been made to create a political forum for the countries in the region. The problem and the danger of nuclear proliferation was vividly shown by the North Korean nuclear crisis in the last years. This issue not only halted the fragile process of normalization between the two Koreas, which started in 1988, but almost led to a new military conflict on the peninsula involving the two Koreas and the USA. It was defused only after the USA proved willing to offer security guarantees to North Korea. This problem still needs to be resolved, and it demands radical changes in the overall political environment in the region. Needless to say, proliferation in North Korea would have entailed grave consequences for the security of the region as well as for the international non-proliferation regime. This paper reviews the issue of nuclear proliferation of the three non-nuclear states in the region and deals with the non-introduction of nuclear weapons in the region by the nuclear powers. It discusses the prospects for a nuclear-weapon-free zone on the Korean peninsula. Perspectives of a sustainable security environment in East Asia will be briefly discussed

  8. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  9. Job security or employment security : What's in a name?

    NARCIS (Netherlands)

    Zekic, Nuna

    2016-01-01

    The main aim of the article is to survey and conceptualize the place of employment security in labour law, and to explore a number of important legal questions relating to this concept. After scrutinizing the notion of employment security, the author endorses the view that job security that exists

  10. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  11. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  12. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  13. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Science.gov (United States)

    2010-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...

  14. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  15. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  16. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  19. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  20. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  1. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  2. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  3. The Sorong Fault Zone, Indonesia: Mapping a Fault Zone Offshore

    Science.gov (United States)

    Melia, S.; Hall, R.

    2017-12-01

    The Sorong Fault Zone is a left-lateral strike-slip fault zone in eastern Indonesia, extending westwards from the Bird's Head peninsula of West Papua towards Sulawesi. It is the result of interactions between the Pacific, Caroline, Philippine Sea, and Australian Plates and much of it is offshore. Previous research on the fault zone has been limited by the low resolution of available data offshore, leading to debates over the extent, location, and timing of movements, and the tectonic evolution of eastern Indonesia. Different studies have shown it north of the Sula Islands, truncated south of Halmahera, continuing to Sulawesi, or splaying into a horsetail fan of smaller faults. Recently acquired high resolution multibeam bathymetry of the seafloor (with a resolution of 15-25 meters), and 2D seismic lines, provide the opportunity to trace the fault offshore. The position of different strands can be identified. On land, SRTM topography shows that in the northern Bird's Head the fault zone is characterised by closely spaced E-W trending faults. NW of the Bird's Head offshore there is a fold and thrust belt which terminates some strands. To the west of the Bird's Head offshore the fault zone diverges into multiple strands trending ENE-WSW. Regions of Riedel shearing are evident west of the Bird's Head, indicating sinistral strike-slip motion. Further west, the ENE-WSW trending faults turn to an E-W trend and there are at least three fault zones situated immediately south of Halmahera, north of the Sula Islands, and between the islands of Sanana and Mangole where the fault system terminates in horsetail strands. South of the Sula islands some former normal faults at the continent-ocean boundary with the North Banda Sea are being reactivated as strike-slip faults. The fault zone does not currently reach Sulawesi. The new fault map differs from previous interpretations concerning the location, age and significance of different parts of the Sorong Fault Zone. Kinematic

  4. A two-dimensional time domain near zone to far zone transformation

    Science.gov (United States)

    Luebbers, Raymond J.; Ryan, Deirdre; Beggs, John H.; Kunz, Karl S.

    1991-01-01

    In a previous paper, a time domain transformation useful for extrapolating 3-D near zone finite difference time domain (FDTD) results to the far zone was presented. In this paper, the corresponding 2-D transform is outlined. While the 3-D transformation produced a physically observable far zone time domain field, this is not convenient to do directly in 2-D, since a convolution would be required. However, a representative 2-D far zone time domain result can be obtained directly. This result can then be transformed to the frequency domain using a Fast Fourier Transform, corrected with a simple multiplicative factor, and used, for example, to calculate the complex wideband scattering width of a target. If an actual time domain far zone result is required it can be obtained by inverse Fourier transform of the final frequency domain result.

  5. What kind of cyber security? Theorising cyber security and mapping approaches

    OpenAIRE

    Laura Fichtner

    2018-01-01

    Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances...

  6. 17 CFR 404.5 - Securities counts by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... registered government securities brokers and dealers. 404.5 Section 404.5 Commodity and Securities Exchanges... AND PRESERVATION OF RECORDS § 404.5 Securities counts by registered government securities brokers and dealers. (a) Securities counts. Every registered government securities broker or dealer shall comply with...

  7. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Creation of participant's security entitlement... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security... public money, including without limitation deposits to the Treasury tax and loan accounts, or other...

  8. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  9. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  10. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    field of PP and most of them have been revised at least once. They have been produced by the French Operators, assessed by the IPSN and approved by the French Competent Authority. They are mandatory as far as PP is concerned for NM held in category I facilities. To go ahead preliminary security studies in the field of MC and A have been performed by operators of two different types of facilities, the results of which are very encouraging. In the field of PP, security studies are based on an analysis consisting in grouping together all the possible paths leading to NM in compliance with a set of threats. Diagrams could be used to show which actions have to be taken to successfully carry out the theft of NM. This may involve crossing zones or outwitting detection devices and overcoming obstacles. By following the diagrams mentioned above, the probability of undetected persons or nuclear materials as they progress in the facility is evaluated. The relevant criteria to assume that the theft has been detected is determined. Then the time elapsing between positive detection of the action and the removal of the NM from the facility is estimated. This estimate is based on documented data and/or the results of tests carried out in the facility or elsewhere. Critical paths are taken as being those along which nuclear materials can be removed from the facility in the shortest time after detection. Special care is taken when analyzing these paths. In the field of MC and A, when unauthorized removal or dysfunction occurs, a discrepancy appears between the physical reality of NM and the way in which it is represented in the MC and A systems. In the case of these studies, an assumption is made that such a discrepancy exists in compliance with a set of threats. Then, the purpose of the security study is to analyse the way in which the discrepancy is revealed in connection with a discovery threshold amount, if any. It should be noted that possible detection of the discrepancy by the

  11. Root zone effects on tracer migration in arid zones

    International Nuclear Information System (INIS)

    Tyler, S.W.; Walker, G.R.

    1994-01-01

    The study of groundwater recharge and soil water movement in arid regions has received increased attention in the search for safe disposal sites for hazardous wastes. In passing through the upper 1 to 2 m of most soil profiles, tracers indicative of recharge such as Cl, 2 H, 18 O, Br, 3 H, and 56 Cl are subjected to a wide range of processes not encountered deeper in the profile. This transition zone, where water enters as precipitation and leaves as recharge, is often ignored when environmental tracers are used to estimate deep soil water flux and recharge, yet its effect may be profound. In this work, we reexamine the processes of root extraction and its effect on the velocity and distribution of tracers. Examples are presented for idealized conditions, which show clearly the relation between the root zone processes and the deep drainage or recharge. The results indicate that, when recharge is small and root zone processes are not accounted for, tracer techniques can significantly overestimate recharge until the tracer has moved well below the root zone. By incorporating simple models of root zone processes, a clearer understanding of tracer distributions and a more accurate estimate of recharge can then be made. 11 refs., 9 figs

  12. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  13. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  14. Polish Security Printing Works in the system of public and economic security

    OpenAIRE

    Remigiusz Lewandowski

    2013-01-01

    The article raises the issue of placing PWPW in the system of economic and public security. Two particular categories of security connected with PWPW business activity, i.e. identification and transactional security, have been defined and discussed in the article. The most essential factors affecting the above security categories as well as relations between identification/transactional security and economic/public security. The article indicates that PWPW plays an important role in the state...

  15. Radiant zone heated particulate filter

    Science.gov (United States)

    Gonze, Eugene V [Pinckney, MI

    2011-12-27

    A system includes a particulate matter (PM) filter including an upstream end for receiving exhaust gas and a downstream end. A radiant zoned heater includes N zones, where N is an integer greater than one, wherein each of the N zones includes M sub-zones, where M is an integer greater than or equal to one. A control module selectively activates at least a selected one of the N zones to initiate regeneration in downstream portions of the PM filter from the one of the N zones, restricts exhaust gas flow in a portion of the PM filter that corresponds to the selected one of the N zones, and deactivates non-selected ones of the N zones.

  16. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  17. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  18. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  19. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  20. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  1. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  2. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  3. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  4. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  5. Towards stacked zone plates

    International Nuclear Information System (INIS)

    Werner, S; Rehbein, S; Guttman, P; Heim, S; Schneider, G

    2009-01-01

    Fresnel zone plates are the key optical elements for soft and hard x-ray microscopy. For short exposure times and minimum radiation load of the specimen the diffraction efficiency of the zone plate objectives has to be maximized. As the efficiency strongly depends on the height of the diffracting zone structures the achievable aspect ratio of the nanostructures determines these limits. To reach aspect ratios ≥ 20:1 for high efficient optics we propose to superimpose zone plates on top of each other. With this multiplication approach the final aspect ratio is only limited by the number of stacked zone plate layers. For the stack process several nanostructuring process steps have to be developed and/or improved. Our results show for the first time two layers of zone plates stacked on top of each other.

  6. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  7. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  8. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  9. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  10. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  11. An analysis of coastal zone management in England and the Netherlands

    International Nuclear Information System (INIS)

    Jones, S.D.R.

    1998-08-01

    The coastal zone is an area of crucial economic and ecological significance, which has increasingly been recognised in land-use planning. Within the coastal zone, integrating land-use planning and environmental management is recognised as one way to minimise trade-offs of interest between economic development and environmental objectives. Many governments are currently discussing the potential role of integrated coastal zone management (CZM) within their planning systems, while some international organisations promote CZM as a means to counter the loss of coastal resources due to human occupation of the coast. This thesis examines how the coastal zone in the United Kingdom is perceived and how effectively CZM is being promoted as a planning model to secure sustainable coastal development through the integration of planning policies. Policy integration is not a quixotic quest, but a model suggesting appropriate methods to manage and reduce conflicts. Any planning model can be traceable to varying assumptions and propositions from political thought, which in turn arises from different political practices. Each CZM plan thus reflects the planning and policy culture of its national system. In order to provide a context within which to assess the UK approach, the development of CZM in the Netherlands is also examined. Both national planning systems have comprehensive statutory land-use planning systems, while marine issues are controlled sectorally by central government. Neither administration has a national CZM policy framework. This thesis therefore includes a comparison of two management plans: the Wash Estuary Management Plan and Integraal Beleidsplan Voordelta. By comparing the organisational structures, policy development and implementation, the case studies provide an insight into the national CZM planning strategy currently being followed in the UK. Finally, the thesis concludes by identifying ways in which CZM might be further improved in the UK and also

  12. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  13. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  14. PCI DSS: Security Standard and Security in Fact

    OpenAIRE

    M. V. Kuzin

    2011-01-01

    The article focuses on Payment Card Industry Data Security Standard (PCI DSS) requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  15. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  16. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  17. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  18. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  19. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  20. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  1. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  2. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  3. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  4. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  5. PCI DSS: Security Standard and Security in Fact

    Directory of Open Access Journals (Sweden)

    M. V. Kuzin

    2011-12-01

    Full Text Available The article focuses on Payment Card Industry Data Security Standard (PCI DSS requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  6. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  7. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  8. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  9. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  10. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  11. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  12. RADIATION ACCESS ZONE AND VENTILATION CONFINEMENT ZONE CRITERIA FOR THE MGR SURFACE FACILITIES

    International Nuclear Information System (INIS)

    D. A. Padula

    2000-01-01

    The objectives of this technical report are to: (1) Establish the criteria for Radiation Access Zone (RAZ) designation. (2) Establish the criteria for the Ventilation Confinement Zone (VCZ) designation. The scope will be to formulate the RAZ and VCZ zoning designation for the Monitored Geologic Repository (MGR) surface facilities and to apply the zoning designations to the current Waste Handling Building (WHB), Waste Treatment Building (WTB), and Carrier Preparation Building (CPB) configurations

  13. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear... PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security background checks for secure transfer of nuclear materials. Licensees are excepted from the security...

  14. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  15. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  16. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  17. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  18. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  20. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  1. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  2. What kind of cyber security? Theorising cyber security and mapping approaches

    Directory of Open Access Journals (Sweden)

    Laura Fichtner

    2018-05-01

    Full Text Available Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.

  3. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  4. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  5. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  8. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  9. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  10. Fiscal Year 2007 Phased Construction Completion Report for the Zone 2 Soils, Slabs, and Subsurface Structures at East Tennessee Technology Park, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    RSI

    2008-03-01

    The purpose of this Phased Construction Completion Report (PCCR) is to present the fiscal year (FY) 2007 results of characterization activities and recommended remedial actions (RAs) for 11 exposure units (EUs) in Zone 2 (Z2-01, Z2-03, Z2-08, Z2-23, Z2-24, Z2-28, Z2-34, Z2-37, Z2-41, Z2-43, and Z2-44) at the East Tennessee Technology Park (ETTP), which is located in the northwest corner of the U.S. Department of Energy (DOE) Oak Ridge Reservation in Oak Ridge, Tennessee (Fig. 1). ETTP encompasses a total land area of approximately 5000 acres that has been subdivided into three zones--Zone 1 ({approx}1400 acres), Zone 2 ({approx}800 acres), and the Boundary Area ({approx}2800 acres). Zone 2, which encompasses the highly industrialized portion of ETTP shown in Fig. 1, consists of all formerly secured areas of the facility, including the large processing buildings and direct support facilities; experimental laboratories and chemical and materials handling facilities; materials storage and waste disposal facilities; secure document records libraries; and shipping and receiving warehouses. The Zone 2 Record of Decision for Soil, Buried Waste, and Subsurface Structure Actions in Zone 2, East Tennessee Technology Park, Oak Ridge, Tennessee (DOE 2005) (Zone 2 ROD) specifies the future end use for Zone 2 acreage as uncontrolled industrial for the upper 10 ft of soils. Characterization activities in these areas were conducted in compliance with the Zone 2 ROD and the Dynamic Verification Strategy (DVS) and data quality objectives (DQOs) presented in the Remedial Design Report/Remedial Action Work Plan for Zone 2 Soils, Slabs, and Subsurface Structures, East Tennessee Technology Park, Oak Ridge, Tennessee (DOE 2007) (Zone 2 RDR/RAWP). The purpose of this PCCR is to address the following: (1) Document DVS characterization results for the accessible EUs in FY 2007; (2) Describe and document the risk evaluation for each EU, and determine if the EU met the Zone 2 ROD requirements

  11. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

    OpenAIRE

    Kalaiprasath, R.; Elankavi, R.; Udayakumar, R.

    2017-01-01

    The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether thes...

  12. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  13. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  14. Health care workers in danger zones: a special report on safety and security in a changing environment.

    Science.gov (United States)

    Redwood-Campbell, Lynda J; Sekhar, Sharonya N; Persaud, Christine R

    2014-10-01

    Violence against humanitarian health care workers and facilities in situations of armed conflict is a serious humanitarian problem. Targeting health care workers and destroying or looting medical facilities directly or indirectly impacts the delivery of emergency and life-saving medical assistance, often at a time when it is most needed. Attacks may be intentional or unintentional and can take a range of forms from road blockades and check points which delay or block transport, to the direct targeting of hospitals, attacks against medical personnel, suppliers, patients, and armed entry into health facilities. Lack of access to vital health care services weakens the entire health system and exacerbates existing vulnerabilities, particularly among communities of women, children, the elderly, and the disabled, or anyone else in need of urgent or chronic care. Health care workers, especially local workers, are often the target. This report reviews the work being spearheaded by the Red Cross and Red Crescent Movement on the Health Care in Danger initiative, which aims to strengthen the protections for health care workers and facilities in armed conflicts and ensure safe access for patients. This includes a review of internal reports generated from the expert workshops on a number of topics as well as a number of public sources documenting innovative coping mechanisms adopted by National Red Cross and Red Crescent Societies. The work of other organizations is also briefly examined. This is followed by a review of security mechanisms within the humanitarian sector to ensure the safety and security of health care personnel operating in armed conflicts. From the existing literature, a number of gaps have been identified with current security frameworks that need to be addressed to improve the safety of health care workers and ensure the protection and access of vulnerable populations requiring assistance. A way forward for policy, research, and practice is proposed for

  15. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  16. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  17. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  18. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    OpenAIRE

    Ali, Ali Abdul Kadir

    2015-01-01

    This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security re...

  19. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  20. 33 CFR 165.1315 - Safety Zones: Fireworks displays in the Captain of the Port Portland Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety Zones: Fireworks displays... Coast Guard District § 165.1315 Safety Zones: Fireworks displays in the Captain of the Port Portland Zone. (a) Safety zones. The following areas are designated safety zones: (1) Cinco de Mayo Fireworks...

  1. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  2. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  3. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  4. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  5. Coastal zones : shifting shores, sharing adaptation strategies for coastal environments

    Energy Technology Data Exchange (ETDEWEB)

    Hay, J.E. [Waikato Univ. (New Zealand); Morneau, F.; Savard, J.P. [Ouranos, Montreal, PQ (Canada); Madruga, R.P. [Centre of Investigation on the Global Economy (Cuba); Leslie, K.R. [Caribbean Community Climate Change Centre (Belize); Agricole, W. [Ministry of Environment and Natural Resources (Seychelles); Burkett, V. [United States Geological Survey (United States)

    2006-07-01

    A parallel event to the eleventh Conference of Parties (COP) to the United Nations Framework Convention of Climate Change was held to demonstrate examples of adaptation from around the world in the areas of food security, water resources, coastal zones, and communities/infrastructure. Panels on each theme presented examples from developing countries, countries in economic transition, and developed countries. These 4 themes were chosen because both mitigation and adaptation are essential to meeting the challenge of climate change. The objective of the event was to improve the knowledge of Canada's vulnerabilities to climate change, identify ways to minimize the negative effects of future impacts, and explore opportunities that take advantage of any positive impacts. This third session focused on how coastal communities are adapting to climate change in such places as Quebec, the Caribbean, and small Island States. It also presented the example of how a developed country became vulnerable to Hurricane Katrina which hit the coastal zone in the United States Gulf of Mexico. The presentations addressed the challenges facing coastal communities along with progress in risk assessment and adaptation both globally and in the Pacific. Examples of coastal erosion in Quebec resulting from climate change were presented along with climate change and variability impacts over the coastal zones of Seychelles. Cuba's vulnerability and adaptation to climate change was discussed together with an integrated operational approach to climate change, adaptation, biodiversity and land utilization in the Caribbean region. The lessons learned from around the world emphasize that adaptation is needed to reduce unavoidable risks posed by climate change and to better prepare for the changes ahead. refs., tabs., figs.

  6. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  7. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  8. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  9. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  10. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  11. 77 FR 30245 - Safety Zones; Annual Fireworks Events in the Captain of the Port Detroit Zone

    Science.gov (United States)

    2012-05-22

    ...'' N, 082-51'-18.70'' W (NAD 83). This proposed zone would be enforced one evening during the last week...-AA00 Safety Zones; Annual Fireworks Events in the Captain of the Port Detroit Zone AGENCY: Coast Guard... by adding three permanent safety zones within the Captain of the Port Detroit Zone. This action is...

  12. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  13. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  14. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  15. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  16. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  17. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  18. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  19. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  20. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.