GATES, GUARDS, GUNS AND GEEKS: The Changing Face of Nuclear Security and the IAEA s Leading Role in Promoting Computer Security for Nuclear Facilities
|
|
- Sheila Walton
- 6 years ago
- Views:
Transcription
1 GATES, GUARDS, GUNS AND GEEKS: The Changing Face of Nuclear Security and the s Leading Role in Promoting Computer Security for Nuclear Facilities Presented by: Donald D. Dudenhoeffer International Atomic Energy Agency
2 Computer and Information Security The s Division of Nuclear Security (NSNS) Information and Computer Security programme is focused on preventing computer acts that could directly or indirectly lead to: unauthorized removal of nuclear/other radioactive material sabotage against nuclear material or nuclear facilities theft of nuclear sensitive information. 2
3 Role in Computer Security The Division of Nuclear Security (NSNS) seeks to support Member States in enhancing their computer security with their nuclear security regime through the development of guidance documents, expert meetings, training and supporting activities. The resolution GC(57)/RES/10 of the 57th General Conference which noted the s efforts to raise awareness of the threat of cyber-attacks and their potential impact on nuclear security, and encouraged the to make further efforts to improve international cooperation in this regard.
4 The Changing Face of Nuclear Security Nuclear security is the protection of nuclear material, other radioactive material, associated facilities, and associated activities, including transport security. Nuclear security measures are designed to support the prevention of, detection of, and response to, criminal or intentional unauthorized acts involving or directed at such materials, facilities, operations. GATES GUARDS GUNS GEEKS A new security expert is in town 4
5 Same Threat Actors with a new weapon Disgruntled Employee Internal Covert Agent Human Error Threat Origins Extremist Groups Terrorist Groups External Organized Crime Nation States Target of Opportunity Threat = capability + intent + opportunity 5
6 Threat and Attack Characteristics Less Strategic Information Warfare Major Economic Gain Cyber Terrorism Asymmetric Warfare Sophisticated Injection Poison Data Compromise Process LIKELIHOOD Very Directed Cyber Attacks Structured Hackers Direct & Targeted Monetary Gain Extreme Activist / Groups Disgruntled Employee Disruption General Cyber Attacks - Less Structured Notoriety and Fame Just to Do It Worm Hacking Economy DOS Probe System Control System Compromise GRP I Mainstream GRP II & III Concentrated DDOS Directed Corruption GRP II Organized Crime Competitors Hackers for Hire Low & slow Persistent Presence GRP III Nation States Terrorist Smallest CONSEQUENCES Slide Courtesy of Idaho National Laboratory Largest 6
7 Computer Security Events Presented multiple computer security events that had direct impact or relevance for Nuclear Monju NPP (Japan) Compromise of control room computer and release of information Korea Hydro and Nuclear Power (KHNP) Computer compromise and release of NPP documents German Steel Mill Attack Control system compromise causing physical damage. Hackers had good understanding of control system operation. What does 2015 Hold?
8 Computer Security Events -continued Facilities are not just the only targets of attack! 2012 Compromise of an old server resulted in the release of addresses and other information USNRC Victim of multiple attacks that compromised s and accounts. Areva(France) Reports in 2011 of a targeted attack against Areva RSA(USA) Reports in 2011 of a phishing compromise and loss of data related to security products
9 Terms and Interfaces Computer Security Why not? Cyber security, IT security, ICT security, ICS security, digital system security. Information Security is not Computer Security Information security deals with the larger area of sensitive information identification, classification, marking, and handling 9
10 Safety and Security Interface Die Sicherheit DBA DBT Fault Trees Safety People Process Equip. Attack Trees Security ICS/IC IT PPS 10
11 NSNS Information and Computer Security NSNS Information and Computer Security Program Objective: The objective of NSNS s related activities is to provide States with the guidance and expertise they need to develop and implement effective information and computer security to enhance their overall national nuclear security regime. Activities and Resources provided by the under this program include: Technical Guidance Documents Expert Meetings and Technical Information exchange forums (CN, CS, TM) Regional and National Training Activities Regional/International Exercise Support Outreach 11
12 Information and Computer Security support at the multiple levels for building a robust and tested Information and Computer Security Programme Exercise the Programme Assess and Evaluate Core Elements: Prevent Detect Respond Implement the Programme Build Awareness Develop Policy 12
13 The Nuclear Security Series (NSS) Address nuclear security issues relating to the prevention and detection of, and response to, theft, sabotage, unauthorized access and illegal transfer or other malicious acts involving nuclear material and other radioactive substances and their associated facilities. 13
14 Application and Audience International Instruments & NSS Guides International Bodies Organizations / Facilities National Authorities Competent Authorities 14
15 International Instruments examples Legally Binding - concrete obligations and relationships under international law The Convention on the Physical Protection of Nuclear Material (CPPNM)(INFCIRC/274/Rev.1)(1987) and 2005 Amendment International Convention for the Suppression of Terrorist Bombings (Terrorist Bombings Convention) International Convention for the Suppression of Acts of Nuclear Terrorism (Nuclear Terrorism Convention) UN Security Council resolutions adopted under Chapter VII of the UN Charter Resolutions 1373 (2001) and 1540 (2004) Non-binding - applied voluntarily by States Physical Protection of Nuclear Material and Nuclear Facilities (INFCIRC/225/Rev.5/NSS No. 13) The United Nations Global Counter-Terrorism Strategy (A/RES/60/288) Code of Conduct on the Safety and Security of Radioactive Sources (GOV/2004/49-GC(47)/9)(2003) 15
16 Basis - Information Security Nuclear Security Fundamentals (NSS 20) 3.3 (g) Provide for the establishment of regulations and requirements for protecting the confidentiality of sensitive information and for protecting sensitive information assets; 3.6 (e) Ensuring through appropriate arrangements that sensitive information or other information exchanged in confidence is adequately and appropriately protected. sensitive information. Information, in whatever form, including software, the unauthorized disclosure, modification, alteration, destruction, or denial of use of which could compromise nuclear security. sensitive information assets. Any equipment or components that are used to store, process, control or transmit sensitive information. 16
17 Basis - Computer Security Nuclear Security Series No 13 (INFCIRC/225/Revision 5) Computer based systems used for physical protection, nuclear safety, and nuclear material accountancy and control should be protected against compromise (e.g. cyber attack, manipulation or falsification) consistent with the threat assessment or design basis threat. 17
18 Basis - Information Security Nuclear Security Series No 23-G Security of Nuclear Information This publication provides guidance on implementing the principle of confidentiality and on the broader aspects of information security (i.e. integrity and availability). Specifically it seeks to assist states in the identification, classification, and assignment of appropriate security controls to information that could adversely impact nuclear security if compromised. 18
19 Basis - Computer Security NSS17 Computer Security at Nuclear Facilities Technical Guidance The objective of the document is to provide guidelines to personnel designing, implementing, and managing Instrumentation and Control (I&C) and Information systems and networks at nuclear facilities. The document addresses prevention and detection of potential attacks through reference to best practices in architecture, assurance and management of security information and I&C systems. 19
20 NSS and TECDOCs in Development Document TECDOC NST037 Conducting Computer Security Assessments - Provides good practices for organizing and conducting computer security assessments associated with nuclear security TECDOC NST038 Computer Security Incident Response - Provides good practices for implementing computer security incident response processes between competent authorities, operators, and technical support organizations. NSS Technical Guidance -NST036 Computer Security of I&C Systems at Nuclear Facilities. - Provides guidance on implementing computer security controls across the life cycle of nuclear instrumentation and control systems. NSS Implementing Guide NST045 Computer Security for Nuclear Security. - Provides overarching guidance to assist Member States in implementing computer security as a part their nuclear security regime. NSS Technical Guidance NST047 Computer Security Techniques for Nuclear Facilities. - Provides discussion on good practices for implementing computer security associated digital technologies at nuclear facilities. Status Document Completed. Publication in 2015 Document Completed. Publication in 2015 Approved for 120 day Member State Review. Publication in 2015/2016 Under development Under development 20
21 Training Courses (Regional and National) Nominal Training 5 day instructor based course covering Nuclear Series Guidance, international standards and industry good practices Taught by a 3-4 member team of computer/information security experts Pre 2012: Beijing Bucharest Indonesia Tunisia Lithuania ROK South Africa Germany Argentina 2013 Courses Romania (NTC) USA (RTC) China (RTC) Ghana (RTC) 2014 Courses Brazil (April - Advanced) Jordan (May Awareness) Moldova (Oct Awareness) India (Nov Advanced) Korea (Nov Assessment) Japan (NTC) Hungary (NTC) Romania (NTC) UAE (NTC) China (NTC) 21
22 NTC & RTC Computer Security Topics Primary Training Courses 1. Basic Information and Computer Security Awareness 2. Conducting Computer Security Assessments (new 2013) 3. Advanced Course in Information and Computer Security (new 2014) 4. Computer Security for Nuclear Industrial Control Security (ICS) and Instrumentation and Control (I&C) Systems (2015) Courses can be adjusted to fit national or regional needs. Basic Awareness Course Topics Threat and Consequence awareness Basic concepts Laws / Regulations / Regulatory Guidance Policy / requirements Interplay with other security domains Sensitive information management Threat / Risk Methodologies Programme assessment Security Culture/Training programme Security Control Concepts Security design Cryptography and Encryption Component/node security Network security Instrumentation and Control (I&C) security Access control System planning and acceptance Physical Protection Document and Media protection Methods of compromise Incident response / management Personnel security 22
23 Profession Development Course Nuclear Security Series No. 12 Educational Programme in Nuclear Security Goal the development of a comprehensive nuclear security human resource development programme NS22 Computer Security for Nuclear Security Professionals university course consisting of a peer-reviewed textbook, and instructional material, including exercises Supports Computer Security concepts and awareness training in the nuclear security professional community, Developed with the International Nuclear Security Education Network (INSEN) NS22 Textbook NS22 Course currently being taught at the Monterey Institute of International Studies 23
24 elearning Training Series Future courses on Information Security Conducting Assurance Activities Security of I&C Systems Incident Response 24
25 Cyber Security User s Group s information portal for cyber security 25
26 Computer Security Conference International Conference on Computer Security in a Nuclear World: Expert Discussion and Exchange Headquarters, Vienna, Austria, 1 5 June 2015 One of the key purposes of the conference is to provide a global forum for Information Exchange for competent authorities, operators, system and security vendors, and other entities engaged in computer security activities relevant to nuclear security. Key dates and Deadlines: Registration is open 31 May 2015 Early Conference check-in 1-5 June 2015 Conference Scientific Secretary: Mr Donald D. Dudenhoeffer CompSec2015@iaea.org, d.dudenhoeffer@iaea.org Current statistics (16 Feb 2015) Registered Participants: 404 Represented Countries: 89 International Organizations: 14 Submitted Papers: 150
27 Conference Team
28 Tunisia Thailand Spain Slovenia Jamaica Israel Iran, Islamic Republic of Democratic Rep. of the Congo Chile Bulgaria Bangladesh Armenia United Republic of Tanzania Russian Federation Niger Mexico Lithuania Belgium Australia Algeria South Africa Serbia Mongolia Kazakhstan Jordan Japan Italy Egypt Czech Republic Belarus Vietnam Switzerland Brazil Austria Romania Pakistan Malaysia Indonesia Ghana Korea, Republic of India Turkey Morocco Argentina Canada Slovakia Netherlands Finland United Kingdom Hungary France China Nigeria Germany United States of America Participation of Countries with Nuclear Facilities Operating/under construction/ planned NPPS Research Reactors Fuel Cycle Facilities
29 Conference Addressing the multiple aspects of Nuclear Security Tracks 1. Cyberthreats in Nuclear Security 2. Computer Security and System Design for Systems at Nuclear Facilities 3. Coordination for Ensuring Computer Security in a Nuclear Security Regime 4. Nuclear Security Regulatory Approaches to Information and Computer Security 5. Computer Security Programmes at Licensed Facilities 6. Computer Security Management in Nuclear Security 7. Computer Security Culture and Capacity Building for Nuclear Security 8. Special Topics 9. International and Legal Considerations in Relation to Computer Security at Nuclear
30 Questions? Mr Donald D. Dudenhoeffer Division of Nuclear Security Department of Nuclear Safety and Security International Atomic Energy Agency T: (+43-1)
IAEA Division of Nuclear Security
IAEA Division of Nuclear Security Computer Security Activities Overview Donald Dudenhoeffer 25 May 2017 Computer and Information Security The Division of Nuclear Security (NSNS) seeks to support Member
More informationJoint ICTP-IAEA School of Nuclear Energy Management November 2012
2374-20 Joint ICTP- School of Nuclear Energy Management 5-23 November 2012 Establishing National Nuclear Security Infrastructure (Module 9 Topics 3 & 4) EVANS Rhonda International Atomic Energy Agency,
More informationSafety of Nuclear Installations
Objective To continuously improve the safety of nuclear installations during site evaluation, design, construction and operation through the availability of safety standards and their application. To support
More informationIAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities
59 th General Conference Senior Regulators Meeting Security Session 16 September 2015 IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities Khammar Mrabit Director,
More informationSafety of Nuclear Installations
Objective To continuously improve the safety of nuclear installations during site evaluation, design, construction and operation through the availability of set safety standards and their application.
More informationMeasures to Maintain Post-Nuclear Security Summit Momentum for Continuously Enhancing Nuclear Security
Measures to Maintain Post-Nuclear Security Summit Momentum for Continuously Enhancing Nuclear Security The International Forum on Peaceful Use of Nuclear Energy, Nuclear Non-Proliferation and Nuclear Security
More informationThe Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System
The Role of SANAS in Support of South African Regulatory Objectives Mr. Mpho Phaloane South African National Accreditation System Outline of Presentation INTRODUCTION STATUS OF SANAS TECHNICAL INFRASTRUCTURE
More informationSpoka Meet Audio Calls Rates Dial-In UK
Spoka Meet Audio Calls Rates Dial-In UK Country Toll/Toll Free Landline/Mobile GBP Argentina Toll Landline 0 Australia Toll Landline 0 Austria Toll Landline 0 Bahrain Toll Landline 0 Belgium Toll Landline
More informationJoint Statement on National Nuclear Detection Architectures
Information Circular INFCIRC/905 Date: 20 December 2016 General Distribution Original: English Communication dated 14 December 2016 received from the Permanent Mission of Finland concerning a Joint Statement
More informationDigital EAGLEs. Outlook and perspectives
2016 Digital EAGLEs Outlook and perspectives Fixed and Mobile broadband adoption rates in the next decade Changes in Fixed-Broadband penetration 2014-25 Changes in Mobile-Broadband penetration 2014-25
More informationAccess Code and Phone Number
Algeria Dial International collect/reverse charge number: 1-212-559-5842 Argentina For phones using Telecom: Dial 0-800-555-4288; wait for prompt, then dial 866- For phones using Telefonica: Dial 0-800-222-1288;
More informationNATO Science for Peace and Security (SPS) Programme. Emerging Security Challenges Division NATO
NATO Science for Peace and Security (SPS) Programme Emerging Security Challenges Division NATO Brussels, 22 October 2013 1 History of Civilian Science in NATO 60 70 80 90 00 10 Science Committee Committee
More informationInternational Atomic Energy Agency Meeting the Challenge of the Safety- Security Interface
Meeting the Challenge of the Safety- Security Interface Rhonda Evans Senior Nuclear Security Officer, Division of Nuclear Security Department of Nuclear Safety and Security Outline Introduction Understanding
More informationThe IECEE CB Scheme facilitates Global trade of Information Technology products.
The IECEE CB Scheme facilitates Global trade of Information Technology products. WTO - Symposium on the 15th Anniversary of the Information Technology Agreement 14-15 May 2012 Pierre de RUVO Executive
More informationMoving Professionals Forward. World Leader In Competence Based Certification
Moving Professionals Forward World Leader In Competence Based Certification Professionalism in a changing world The world is changing and project management is changing with it. IPMA is adapting: to the
More informationICS Security Innovation Asia Pacific ICS Security Summit. Singapore 2013
ICS Security Innovation Asia Pacific ICS Security Summit Singapore 2013 Connected Enterprise Global automation landscape Connecting expertise Providing decision ready intelligence Data availability Two-way
More informationCollaborative Regulation in the APP Economy
ITU Regional Economic and Financial Forum of Telecommunications/ICT for Africa Victoria Falls, ZIMBABWE, 30 31 January 2017 Collaborative Regulation in the APP Economy Carmen Prado Wagner Regulatory and
More informationImproving digital infrastructure for a better connected Thailand
Improving digital infrastructure for a better connected 1 Economies across the globe are going digital fast The Global GDP forecast 2017 Economies are setting policies to encourage ICT investment Global
More informationExpert support and Reach back activities
GICNT- Nuclear Detection Working Group Magic Maggiore Ispra 28 March 2017 Expert support and Reach back activities Thierry PELLETIER Nuclear Security Division Safety and Security department International
More informationIAEA Programme on Instrumentation and Control System Design and Engineering for Operating NPPs
Programme on Instrumentation and Control System Design and Engineering for Operating NPPs Presented by Janos Eiler Vienna, 21 May 2013 International Atomic Energy Agency Outline Activities in the area
More informationPurchasing. Operations 3% Marketing 3% HR. Production 1%
Agenda Item DOC ID IAF CMC (11) 75 For Information For discussion For decision For comments to the author IAF End User Survey results (October 211) This report summarises the total responses to the IAF
More informationMining and The Standards World
GMSG and AMTC Santiago Forum 2015 Building Towards the Future of Mining November 3, 2015 Mining and The Standards World The International Standards Organization ISO A Global System + 600 organisations
More informationAppendix G. Percentiles and Standard Deviations of Science Achievement TIMSS 2011 INTERNATIONAL RESULTS IN SCIENCE APPENDIX G 495
Appendix G s and s of Science Achievement TIMSS 2011 INTERNATIONAL RESULTS IN SCIENCE APPENDIX G 495 Appendix G.1: s Appendix of G.1: Science s Achievement of Science Achievement 5th 10th 25th 50th 75th
More informationFAQ: The IECEE CB Scheme
2 nd Edition: April 2013 Intertek Italia Via Principe di Udine, 114-33030 Campoformido (UD) info.etls-italy@intertek.com www.intertek.it Contents What do the initials IECEE CB stand for?... 2 Who are the
More informationWhat Are the Background Characteristics of Mathematics Teachers?
Chapter 6 Teachers of To help place students mathematics achievement in the context of their school and classroom situations, the mathematics teachers of the students tested were asked to complete questionnaires
More informationTurquoise Terminal Returns User Guide for Creating & Uploading a Turquoise Terminal Return
Turquoise Terminal Returns User Guide for Creating & Uploading a Turquoise Terminal Return End-User Documentation Page 1 of 11 Contents Accessing the Terminal Returns application 3 Creating a Terminal
More informationWelcome to Baker McKenzie Stockholm Fifth Annual Trade Day. 7 November 2017
Welcome to Baker McKenzie Stockholm Fifth Annual Trade Day 7 November 2017 Software Classification and Security Alison Stafford Powell and Olof König 3 4 Alison J. Stafford Powell Partner Baker McKenzie
More informationiclass SE multiclass SE 125kHz, 13.56MHz 125kHz, 13.56MHz
Date created: 11 July 2016 Last update: 18 August 2016 READERS REGULATORY CERTIFICATION BY COUNTRY. The following table consists of the current regulatory certifications for the readers. HID Global is
More informationAchievement by Gender in the Mathematics Cognitive Domains at the Fourth and Eighth Grades
Chapter 3 Achievement by Gender in the Mathematics Cognitive Domains at the Fourth and Eighth Grades This chapter presents average achievement by gender for the three mathematics cognitive domains. In
More informationChapter 7. Classroom Characteristics and Instruction
Chapter 7 Classroom Characteristics and Instruction Although the school provides the general context for learning, it is in the classroom setting and through guidance by the teacher that most instruction
More informationCisco Aironet In-Building Wireless Solutions International Power Compliance Chart
Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart ADDITIONAL INFORMATION It is important to Cisco Systems that its resellers comply with and recognize all applicable regulations
More informationPLEASE NOTE: firms may submit one set of research questionnaires covering both China and Hong Kong or separate sets for each jurisdiction
Americas Argentina (Banking and finance; Capital markets; M&A; Project development) Bahamas (Financial and corporate) Barbados (Financial and corporate) Bermuda (Financial and corporate) Bolivia (Financial
More informationNuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting
General Conference GC(60)/RES/10 Date: September 2016 General Distribution Original: English Sixtieth regular session Item 14 of the agenda (GC(60)/20) Nuclear Security Resolution adopted on 30 September
More informationGlobal entertainment and media outlook Explore the content and tools
www.pwc.com/outlook Global entertainment and media outlook Explore the content and tools A comprehensive online source of global analysis for consumer/ end-user and advertising spending 5-year forecasts
More informationTechnology Lifecycle Management Assessment. Know your network - achieve business agility
Technology Lifecycle Management Assessment Know your network - achieve business agility Your network is the platform on which you build the success of your organisation. In addition to connecting your
More informationChapter 5. School Resources for Teaching Mathematics
Chapter 5 School Resources for Teaching Mathematics The most successful schools tend to have students that are relatively economically affluent, speak the language of instruction, and begin school with
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationSoftware-defined Networking Development Model
Software-defined Networking Development Model Explore your roadmap to network programmability with a consulting engagement that assesses your readiness for software-defined networking Business demands
More informationMORE THAN JUST A PRODUCT, CABLOFIL IS A GLOBAL SOLUTION. Safer, more economic economic and more performant and A SYSTEM AN EXPERTISE A SERVICE
CABLOFIL DATA MORE THAN JUST A PRODUCT, CABLOFIL IS A GLOBAL SOLUTION A COMPLETE RANGE FOR EVERY APPLICATIONS A SYSTEM AN EXPERTISE A SERVICE CABLE MANAGEMENT LEADER OF For 40 years, CABLOFIL has revolutionised
More informationThe Critical Importance of CIIP to Cybersecurity
The Critical Importance of CIIP to Cybersecurity Without CIIP there is no Cybersecurity Peter Burnett GFCE-Meridian Coordinator The Global Forum on Cyber Expertise Focus: cyber capacity building (awareness
More informationFor: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops
For: Ministry of Education From Date: 19 November 18-2 December 18 Venue: M1 Shops $200 OFF HANDSETS For new line / port-in / re-contract on mysim e 90 and above plan Reg+ and above plan $150 OFF HANDSETS
More informationNuclear power aspects ITU/ENISA Regional Conference on Cybersecurity, Sofia
Nuclear power aspects ITU/ENISA Regional Conference on Cybersecurity, Sofia Guido Gluschke November 30, 2016 Technische Hochschule Brandenburg University of Applied Sciences 1 Introduction Guido Gluschke
More informationInternational Framework for Nuclear Energy Cooperation
Mission International Framework for Nuclear Energy Cooperation Greater energy security in a cleaner, safer world Mission The International Framework for Nuclear Energy Cooperation provides a forum for
More informationDigital Context Pacific Alliance
SEPTEMBER 2016 Digital Context Pacific Alliance 1 Index Overview 1 Digital scenario 2 ICT access and usage 3 Online activities 4 Regulation Appendix 2 Overview The (PA) has a high position regarding Internet
More informationEventBuilder.com. International Audio Conferencing Access Guide. This guide contains: :: International Toll-Free Access Dialing Instructions
EventBuilder.com International Audio Conferencing Access Guide TM This guide contains: :: International Toll-Free Access Dialing Instructions :: ATFS (Access Toll-Free Service) Dialing Instructions ::
More informationIECEE provides facilitation to the Global Trade
INTERNATIONAL ELECTROTECHNICAL COMMISSION WORLDWIDE SYSTEM FOR CONFORMITY TESTING AND CERTIFICATION OF ELECTRICAL EQUIPMENT AND COMPONENTS IECEE provides facilitation to the Global Trade IECEE takes the
More informationReport on ISO/IEC/JTC1/SC27 Activities in Digital Identities
International Telecommunication Union ITU-T Report on ISO/IEC/JTC1/SC27 Activities in Digital Identities Dick Brackney ISO/SC27 Liaison Officer to ITU-T SG17 Standards Program Manager, U.S. Dept of Defense
More informationNo Purchase needed
www.dialntalk.co.uk No Purchase needed About DialnTalk DialnTalk is the instant dial service developed to offer you easy to use low cost international telephone calls. Our aim is to provide a hassle free
More informationNuclear New Build Market and NIA Supply Chain Support Dr Glen Little Nuclear Industry Association Consultant 11 June 2015
Nuclear New Build Market and NIA Supply Chain Support Dr Glen Little Nuclear Industry Association Consultant 11 June 2015 Contents Overview of the nuclear new build market NIA activities to support UK
More informationChapter 7. Teacher Preparation
Chapter 7 Teacher Preparation Higher science achievement was related to teachers having more teaching experience, being confident in their science teaching, and being satisfied with their careers. The
More informationPatent Portfolio Overview May The data in this presentation is current as of this date.
Patent Portfolio Overview May 2018 1 1 The data in this presentation is current as of this date. Table of Contents Overview HEVC Standard Versions in Licensing Program Patent Evaluation Portfolio Growth
More informationTraining of Welding Personnel Qualification of Welding Personnel Certification of Personnel Certification of Companies Collaboration Projects
EWF The European Federation for Welding, Joining and Cutting, was created in 1992 by all the welding institutes of the European Community with the aim of updating and harmonization training and education
More informationApplications for Disaster Risk Management and Emergency Response in Africa
UN-SPIDER UN ECA SWF Applications for Disaster Risk Management and Emergency Response in Africa Addis Ababa, Ethiopia, 6 9 July 2010. United Nations Platform for Space-based Information for Disaster Management
More informationAutomation DriveServer
Automation Drive Remote maintenance for intelligent solutions Lenze Global Drive Making communication easy Drive the path to open automation Are you looking for a simple way of getting your drives connected
More informationEuropean Nuclear Security Regulators Association
Swiss Federal Nuclear Safety Inspectorate ENSI European Nuclear Security Regulators Association IAEA Nuclear Power in the 21st Century, Saint Petersburg - Technical Session Panel 2 - June 28th 2013 Hans
More informationChapter 6. Teachers of Science
Chapter 6 Teachers of Science Since the teacher is central in creating a classroom environment that supports learning science, Chapter 6 presents information about the preparation and background of science
More informationShell Global Helpline - Telephone Numbers
Shell Global Helpline - Telephone Numbers The Shell Global Helpline allows reports to be submitted by either a web-based form at or by utilising one of a number of telephone lines that will connect you
More informationMultilateral Arrangements in Safety, Licensing & Regulations Capacity Building for Nuclear Safety and Security
Multilateral Arrangements in Safety, Licensing & Regulations Capacity Building for Nuclear Safety and Security Russell Gibbs Senior Safety Officer, Safety and Security Coordination Section Department of
More informationDashboard. Feb 18, Feb 18, 2008 Comparing to: Site. 13,318 Visits 28,414 Pageviews 2.13 Pages/Visit
Dashboard Site Usage 13,318 Visits 28,414 Pageviews 2.13 Pages/Visit 63.93% Bounce Rate 00:03:00 Avg. Time on Site 73.14% % New Visits Visitors Overview Map Overlay world Visitors 9,744 Traffic Sources
More informationManaged Network Services. Managing your network to enable your digital business
Managed Network Services Managing your network to enable your digital business Your network more efficient today, more effective tomorrow How can you optimise cost and performance today, and help your
More informationPublic Safety Working Group (PSWG)
Public Safety Working Group (PSWG) 23 October 2018 Laureen Kapin (US FTC) Co-Chair ICANN63 GAC Plenary Meeting Agenda 1. Introduction and Review of PSWG Activities 2. WHOIS Compliance with GDPR: Impact
More informationServer Virtualisation Assessment. Service Overview
Server Virtualisation Assessment Service Overview Our Server Virtualisation Assessment helps organisations reduce server total cost of ownership and make informed decisions around capacity planning by
More informationStudents Backgrounds And Attitudes Toward Mathematics
Chapter 4 Students Backgrounds And Attitudes Toward Mathematics In describing the educational context in which learning takes place, TIMSS focuses primarily on curricular, instructional, and school resource
More informationOvercoming the Compliance Challenges of VAT Remittance. 12 April :55 to 16:30 (CEST)
Overcoming the Compliance Challenges of VAT Remittance 12 April 2016 15:55 to 16:30 (CEST) Presenters Nicole Jupin Vertex Inc. Senior Solutions Manager David Rossing Vertex Inc. Senior Tax Solutions Engineer,
More informationTanja Masson-Zwaan, IIASL, Leiden University
Tanja Masson-Zwaan, IIASL, Leiden University Terms of Reference Assess the need for a regulatory framework for space resource activities related to the use of mineral and volatile materials on the Moon
More informationTransforming networks and services for communications service providers
Transforming networks and services for communications service providers Do you need more agility to keep pace with new challengers in your market? The change is happening right now The growing number of
More informationService withdrawal: Selected IBM ServicePac offerings
Announcement ZS09-0086, dated April 21, 2009 Service withdrawal: Selected IBM offerings Table of contents 1 Overview 9 Announcement countries 8 Withdrawal date Overview Effective April 21, 2009, IBM will
More informationInnovative Fastening Technologies
Innovative Fastening Technologies Corporate Overview 2011 Update Infastech is one of the world s largest producers of engineered mechanical fasteners with revenues exceeding USD500 million and an industry
More informationNEW JERSEY S HIGHER EDUCATION NETWORK (NJEDGE.NET), AN IP-VPN CASE STUDY
CUSTOMER CASE STUDY NEW JERSEY S HIGHER EDUCATION NETWORK (NJEDGE.NET), AN IP-VPN CASE STUDY SUMMARY NJEDge.Net is a nonprofit consortium of 45 colleges and universities in New Jersey dedicated to promoting
More informationPatent Portfolio Overview July The data in this presentation is current as of this date.
Patent Portfolio Overview July 2017 1 1 The data in this presentation is current as of this date. Table of Contents Overview HEVC Standard Versions in Licensing Program Patent Evaluation Portfolio Growth
More informationPayphone Origination Service Charge Rate Per Min. Mobile Origination Service Charge. MLB Switched Rate Per Min. MLB Dedicated Rate Per Min
SBC Long Distance, LLC 1 st Revised Page 1 d/b/a AT&T Long Distance Effective April 8, 2011 Effective June 30, 2011 the dedicated service offering associated with this Service will be discontinued pursuant
More information8510 AC Spindle Drive Hardware/Firmware Replacement
ALLEN-BRADLEY 8510 AC Spindle Drive Hardware/Firmware Replacement Instructions Introduction The purpose of this publication is to describe the steps needed to replace the circuit boards and/or firmware
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationChapter 8. School Contexts for Learning and Instruction
Chapter 8 School Contexts for Learning and Instruction Chapter 8 presents findings about the school contexts for learning and instruction in science, including school characteristics, policies, and practices.
More informationThe WINS Academy Security Certification Programme: The Route to Demonstrable Competence. Dr Roger Howsley, Executive Director
The WINS Academy Security Certification Programme: The Route to Demonstrable Competence. Dr Roger Howsley, Executive Director IAEA, 14 th May 2014 Key Messages The Nuclear Sector is a long way behind other
More informationDigital Opportunity Index. Michael Minges Telecommunications Management Group, Inc.
Digital Opportunity Index Michael Minges Telecommunications Management Group, Inc. Digital Opportunity Index (DOI) Why How Preliminary results Conclusions WSIS Plan of Action E. Follow-up and evaluation
More informationHybrid Wide-Area Network Application-centric, agile and end-to-end
Hybrid Wide-Area Network Application-centric, agile and end-to-end How do you close the gap between the demands on your network and your capabilities? Wide-area networks, by their nature, connect geographically
More informationNATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36)
NATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36) Project Manager: Lt Col Paulo Viegas Nunes nunes.pfv@mail.exercito.pt Agenda MN CD E&T Objective Working Plan
More informationGLOBAL INITIATIVE TO COMBAT NUCLEAR TERRORISM
GLOBAL INITIATIVE TO COMBAT NUCLEAR TERRORISM We are committed to strengthening global capacity to prevent, detect, and respond to nuclear terrorism. Contents 4 About GICNT 5 Statement of Principles 7
More informationDraft Resolution for Committee Consideration and Recommendation
Draft Resolution for Committee Consideration and Recommendation Committee A: Security and Transparency in a Digital Environment The General Assembly; Draft Resolution Submitted for revision by the delegations
More informationCapacity building in the IAEA Action Plan on Nuclear Safety
International Conference on Human Resource Development for Nuclear Power Programmes: Building and Sustaining Capacity 12 16 May 2014 Capacity building in the IAEA Action Plan on Nuclear Safety Gustavo
More informationDataliner Message Displays Using DL50 Slaves with a DL40 Master
ALLEN-BRADLEY Dataliner Message Displays Introduction This application note describes how to use Dataliner DL50 slave displays with a DL40 display as a master. The DL40 master display contains all messages
More informationHome Resources for Learning Scale, Fourth Grade
Home Resources for Learning Scale, Fourth Grade The Home Resources for Learning (HRL) scale was created based on students and parents responses concerning the availability of five resources described below.
More informationIAEA Action Plan on Nuclear Safety
Action Plan on Nuclear Safety Presented to IEEE Nuclear Power Engineering Committee San Antonio, TX 2011 January 25 Gary Johnson International Atomic Energy Agency g.johnson@iaea.org International Atomic
More informationNANOELECTRONICS AND DIGITAL TECHNOLOGY ENABLING DISRUPTIVE INNOVATION LUC VAN DEN HOVE - PRESIDENT AND CEO
NANOELECTRONICS AND DIGITAL TECHNOLOGY ENABLING DISRUPTIVE INNOVATION LUC VAN DEN HOVE - PRESIDENT AND CEO IMEC S MISSION IMEC S MISSION Imec is the world-leading R&D and innovation hub in nanoelectronics
More informationL-force Controller 3200 C. Control and visualisation compactly combined
L-force Controller 3200 C Control and visualisation compactly combined L-force Your future is our drive 2 Cost efficiency, saving time and improving quality are the challenges of the future. Lenze is tackling
More informationBSRIA Air Conditioning Worldwide Market Intelligence
2013 BSRIA Air Conditioning Worldwide Market Intelligence Over 25 years experience researching key markets worldwide market intelligence in 94 Countries integrated technical and market expertise management
More informationRole of OECD Nuclear Energy Agency (NEA) in the Safety Research Olli Nevander (OECD NEA)
Role of OECD Nuclear Energy Agency (NEA) in the Safety Research Olli Nevander (OECD NEA) 2015 Organisation for Economic Co-operation and Development Overview NEA membership and Committee Structure NEA
More informationOverview of Customs-Trade Partnership Against Terrorism (C-TPAT)
Overview of Customs-Trade Partnership Against Terrorism (C-TPAT) Our Mission We are the guardians of our Nation s borders. We are America s frontline. We safeguard the American homeland at and beyond our
More informationSTRENTHENING REGIONAL COOPERATION IN AFRICA: LESSONS LEARNED FROM THE FORUM OF NUCLEAR REGULATORY BODIES IN AFRICA
STRENTHENING REGIONAL COOPERATION IN AFRICA: LESSONS LEARNED FROM THE FORUM OF NUCLEAR REGULATORY BODIES IN AFRICA Dr. B Tyobeka CEO, National Nuclear Regulator, South Africa Deputy Chairman, FNRBA CONTENTS
More informationElectronic access to technical information. Work in progress in Development of. Members. International Standards,
Members 164 national standards bodies, comprising 111 member bodies, 49 correspondent members, 4 subscriber members. Technical committee structure 3 368 technical bodies, comprising 224 technical committees,
More informationAllianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments. Dr. Lutz Füllgraf
Allianz SE Reinsurance Branch Asia Pacific Systems Requirements & Developments Dr. Lutz Füllgraf Technology and Innovation for Insurance Conference 2007, Sydney 22 March 2007 Contents 1 Importance of a
More informationEE Pay Monthly Add-Ons & Commitment Packs. Version
EE Pay Monthly Add-Ons & Commitment Packs Version 1A Available from 28 October 2015 1 COMMITMENT PACKS In addition to the allowances included in our Standard and EE Extra plans for both Pay Monthly handset
More informationTeacher Job Satisfaction Scale, Fourth Grade
Teacher Job Satisfaction Scale, Fourth Grade The Teacher Job Satisfaction (TJS) scale was created based on how often teachers responded positively to the seven statements described below. Items in the
More informationGlobal Institute for Risk Management Standards
Global Institute for Risk Management Standards Survey Courses Conference Linkedin Group ISO TC 262 Certification Contact!: Alex Dali, Msc, ARM Email!: Alex.Dali@G31000.org Phone: +33 660 4542 80 Disclaimer:
More informationIEC INCIDENT AND EMERGENCY CENTRE
Department of Nuclear Safety and Security IEC INCIDENT AND EMERGENCY CENTRE IEC - Mission Statement Global Focal Point for International Preparedness, Communication and Response for Nuclear and Radiological
More informationThe APEC Model. Global Partnership through Regional Initiatives
The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security
More informationITU Plenipotentiary 2018
ITU Plenipotentiary 2018 Preparations, Expectations and Concerns Chris Buckridge 18 Oct 2018 RIPE Cooperation WG Four Years On!2 ITU Structures and Meetings Plenipotentiary (PP) Standardization (T Sector)
More informationEND-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400
END-OF-LIFE NOTICE, NO. 2566 END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400 Cisco Systems announces the end of life of the Cisco Media Convergence Server 7845H-2400.
More informationMANUAL VOICE/DATA SIMCARD CANADA
MANUAL VOICE/DATA SIMCARD CANADA Copyright 2018. All rights reserved. The content of this document may not be copied,replaced,distributed,published,displayed, modified,or transferred in any form or by
More information