Powered by Deep Web Technologies
Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

2

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Advisory: Cisco Content Services Gateway Vulnerabilities V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands...

3

T-544: Cisco Security Advisory: Cisco Content Services Gateway  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Security Advisory: Cisco Content Services Gateway 4: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities January 27, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities PLATFORM: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 ABSTRACT: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these

4

T-544: Cisco Security Advisory: Cisco Content Services Gateway  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Security Advisory: Cisco Content Services Gateway 4: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities January 27, 2011 - 2:04pm Addthis PROBLEM: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities PLATFORM: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 ABSTRACT: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these

5

T-560: Cisco Security Advisory: Management Center for Cisco Security Agent  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Cisco Security Advisory: Management Center for Cisco 0: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability February 18, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability. PLATFORM: Cisco Security Agent software releases 5.1, 5.2, and 6.0 are affected by this vulnerability. Note: Only the Management Center for Cisco Security Agent is affected by this vulnerability. Cisco Security Agent installations on end-point workstations or servers are not affected by this vulnerability. ABSTRACT: The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote

6

T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity networking solution.

7

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

8

U-011: Cisco Security Response: Cisco TelePresence Video Communication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication...

9

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Cisco IronPort Web / Email Security Appliance Sophos 21: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

10

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IronPort Web / Email Security Appliance Sophos 1: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

11

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

12

U-011: Cisco Security Response: Cisco TelePresence Video Communication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Security Response: Cisco TelePresence Video 1: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability October 14, 2011 - 12:30pm Addthis PROBLEM: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability PLATFORM: Version(s): VCS prior to 7.0 ABSTRACT: A vulnerability was reported in Cisco TelePresence Video Communication Server. A remote user can conduct cross-site scripting attacks. reference LINKS: Cisco Document ID: 113264 SecurityTracker Alert ID: 1026186 CVE-2011-3294 IMPACT ASSESSMENT: Medium Discussion: A vulnerability exists in Cisco TelePresence Video Communication Server (VCS) due to improper validation of user-controlled input to the web-based

13

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer...

14

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

15

T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-725: Cisco Unified Service Monitor and Cisco Unified Operations T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code September 23, 2011 - 9:00am Addthis PROBLEM: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code. PLATFORM: Cisco Unified Service Monitor prior to version 8.6 Cisco Unified Operations Manager prior to version 8.6 CiscoWorks LAN Management Solution software releases 3.1, 3.2, and 4.0. ABSTRACT: Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. reference LINKS: Cisco Security Advisory 113173

16

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

17

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

18

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IronPort Web Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web Email Security Appliance Sophos Anti-Virus Multiple...

19

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011...

20

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-611: Cisco IOS OCSP Revoked Certificate Security Issue | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IOS OCSP Revoked Certificate Security Issue 1: Cisco IOS OCSP Revoked Certificate Security Issue T-611: Cisco IOS OCSP Revoked Certificate Security Issue April 27, 2011 - 2:07am Addthis PROBLEM: A security issue has been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. The security issue is caused due to an error in the OCSP functionality and can lead to a revoked certificate being successfully authenticated. PLATFORM: Cisco IOS 15.0, 15.1 Operating System ABSTRACT: The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug

22

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

23

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

24

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

25

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-531: The WebVPN implementation on Cisco Adaptive Security T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011 - 8:33pm Addthis PROBLEM: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) PLATFORM: Listed Vunerable Platform Details ABSTRACT: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. reference LINKS: CVE Vulnerability Details: CVE-2010-4680 NIST Vulnerability Summary for CVE-2010-4680

26

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless...

27

V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

2: Cisco ASA Software TFTP Protocol Inspection Denial of 2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - 4:00am Addthis PROBLEM: A vulnerability has been reported in Cisco ASA Software, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x, Cisco Adaptive Security Appliance (ASA) 9.x, Cisco ASA 5500-X Series Adaptive Security Appliances ABSTRACT: The vulnerability is reported in versions 8.4(5.7), 8.4(6), 9.0(2.3), 9.1(1.5), and 9.1(2.1). Other versions may also be affected. REFERENCE LINKS: Secunia Advisory SA54699 CVE-2013-3463 Cisco (CSCuh13899) IMPACT ASSESSMENT: Low DISCUSSION: A vulnerability has been reported in Cisco ASA Software, which can be

28

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Intrusion Prevention System SSP Fragmented Traffic 1: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability July 19, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Intrusion Prevention System PLATFORM: Cisco ASA 5500-X Series Adaptive Security Appliances Cisco Intrusion Prevention System (IPS) 7.1 ABSTRACT: A vulnerability in the implementation of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE LINKS: Secunia Advisory SA54246 SecurityTracker ID: 1028806 Cisco Advisory ID: cisco-sa-20130717-ips CVE-2013-1218

29

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

30

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

31

U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Cisco IOS IPSec IKE Unspecified Denial of Service 8: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x ABSTRACT: The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. REFERENCE LINKS: Vendor Advisory Secunia Advisory SA48607 CVE-2012-0381 iMPACT ASSESSMENT: High discussion: The March 28, 2012, Cisco IOS Software Security Advisory bundled

32

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the actual Cisco AnyConnect Secure Mobility Client. The helper application is a Java applet on the Linux and MacOS X platforms, and either a Java applet on the Windows...

33

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

34

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

35

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

36

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

37

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Cisco Prime Data Center Network Manager JBoss RMI Services 14: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands November 1, 2012 - 6:00am Addthis PROBLEM: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands PLATFORM: All Cisco Prime Data Center Network Manager releases prior to release 6.1(1), for both the Microsoft Windows and Linux platforms, are affected by this vulnerability. ABSTRACT: A vulnerability was reported in Cisco Prime Data Center Network Manager. REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20121031-dcnm SecurityTracker Alert ID: 1027712 CVE-2012-5417 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability exists because JBoss Application Server Remote Method

38

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

39

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

40

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

42

V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Cisco Wireless Lan Controller Cross-Site Request Forgery 8: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability December 17, 2012 - 1:00am Addthis PROBLEM: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability PLATFORM: Cisco Wireless LAN Controller (WLC) ABSTRACT: A vulnerability was reported in Cisco Wireless LAN Controller. REFERENCE LINKS: SecurityTracker Alert ID: 1027886 Secunia Advisory SA51546 CVE-2012-5991 CVE-2012-5992 CVE-2012-6007 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Cisco Wireless LAN Controller. A remote user can conduct cross-site request forgery attacks. A remote user can create specially crafted HTML that, when loaded by a target user, will cause arbitrary scripting code to be executed by the

43

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

44

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

45

Computer Security Advisories  

Science Conference Proceedings (OSTI)

... 7090; Computer Incident Advisory Capability (CIAC) http://ciac.llnl.gov/ Email: ciac@llnl.gov or call +1 925 422-8193; Defense ...

46

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

47

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

NLE Websites -- All DOE Office Websites (Extended Search)

Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by...

48

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to obtain potentially sensitive information about the database structure via an id- query to a .cfm file. Successful exploitation of the vulnerabilities described in this...

49

Nuclear / Radiological Advisory Team | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

/ Radiological Advisory Team | National Nuclear Security / Radiological Advisory Team | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear / Radiological Advisory Team Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Operations > Nuclear / Radiological Advisory Team Nuclear / Radiological Advisory Team

50

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco AnyConnect VPN Client Two Vulnerabilities 6: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure Mobility Client VPN Downloader Arbitrary Code Execution Vulnerability Cisco AnyConnect Secure Mobility Client VPN Downloader Software Downgrade Vulnerability Cisco AnyConnect Secure Mobility Client and Cisco Secure Desktop HostScan Downloader Software Downgrade Vulnerability Cisco AnyConnect Secure Mobility Client 64-bit Java VPN Downloader

51

U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Deny Service PLATFORM: Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module ABSTRACT: Several vulnerabilities were reported in...

52

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

53

U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Cisco Linksys WMB54G TFTP Command Injection Vulnerability 18: Cisco Linksys WMB54G TFTP Command Injection Vulnerability U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability July 23, 2012 - 6:49am Addthis PROBLEM: Cisco Linksys WMB54G TFTP Command Injection Vulnerability PLATFORM: Cisco Linksys WMB54G 1.x ABSTRACT: System access from local network reference LINKS: Bugtraq ID: 54615 Original Advisory Secunia Advisory SA49868 Cisco Advisory ID: cisco-sa-20111019-cs IMPACT ASSESSMENT: Medium Discussion: A vulnerability in Cisco Linksys WMB54G was reported, which can be exploited by malicious people to compromise a vulnerable device. The vulnerability is caused due to missing input validation in the TFTP service when running the firmware update functionality and can be exploited to inject and execute arbitrary shell commands. Additionally, it may be

54

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

55

T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Prenotification Security Advisory - Adobe Acrobat & Adobe 4: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates June 10, 2011 - 3:16pm Addthis PROBLEM: Prenotification Security Advisory - Adobe Updates Available Tuesday, June 14, 2011 PLATFORM: Adobe : Security Vulnerabilities Published In 2011, Severity Rating System for Security Bulletins Adobe Reader X (10.0.1) and earlier versions for Windows Adobe Reader X (10.0.3) and earlier versions for Macintosh Adobe Reader 9.4.3 and earlier versions for Windows and Macintosh Adobe Acrobat X (10.0.3) and earlier versions for Windows and Macintosh Adobe Acrobat 9.4.3 and earlier versions for Windows and Macintosh ABSTRACT: A prenotification Security Advisory has been posted in regards to the

56

V-008: Debian Security Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Debian Security Advisory 8: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

57

V-008: Debian Security Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Debian Security Advisory 08: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

58

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

NLE Websites -- All DOE Office Websites (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

59

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

NLE Websites -- All DOE Office Websites (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open

60

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

National Atmospheric Release Advisory Center | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Atmospheric Release Advisory Center | National Nuclear Security Atmospheric Release Advisory Center | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog National Atmospheric Release Advisory Center Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management > National Atmospheric Release Advisory Center

62

V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Unity Express Input Validation Hole Permits Cross-Site 5: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks February 6, 2013 - 1:06am Addthis PROBLEM: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks PLATFORM: Cisco Unity Express prior to 8.0 ABSTRACT: A vulnerability was reported in Cisco Unity Express. REFERENCE LINKS: Cisco Security Notice SecurityTracker Alert ID: 1028075 CVE-2013-1120 IMPACT ASSESSMENT: Medium DISCUSSION: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross site request forgery attacks. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by

63

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity  

Science Conference Proceedings (OSTI)

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes ... Keywords: Networking, Security

Dale Liu

2009-05-01T23:59:59.000Z

64

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

65

Nuclear / Radiological Advisory Team | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

66

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

67

U-016: Cisco IOS Software HTTP Service Loading Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16: Cisco IOS Software HTTP Service Loading Denial of Service 16: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability October 21, 2011 - 9:00am Addthis PROBLEM: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability . PLATFORM: Cisco IOS Software ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition. reference LINKS: CISCO Security Intelligence Operations IntelliShield ID: 24436 CVE-2011-2586 IMPACT ASSESSMENT: Medium Discussion: Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The vulnerability is due to improper

68

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of future of gov Network 2020/MTIPS/TIC Earl Crane, Director for Federal Cybersecurity, National Security Staff, The White House Tim Polk ...

2013-06-17T23:59:59.000Z

69

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... simulated testing set up in fifteen government facilities. ... It is essential to understand the relationship ... to present his paper on Cyber Security Doctrine. ...

2011-07-20T23:59:59.000Z

70

V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Cisco Mobility Services Engine Configuration Error Lets 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an unauthenticated, remote attacker to connect to a database replication port anonymously via Secure Sockets Layer (SSL). REFERENCE LINKS: SecurityTracker Alert ID: 1028972 CVE-2013-3469 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to the misconfiguration of the Oracle SSL service. An attacker could exploit this vulnerability by connecting to an

71

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

NLE Websites -- All DOE Office Websites (Extended Search)

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities August 2, 2013 - 2:25am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco WAAS (Wide Area Application Services), which can be exploited by malicious users and malicious people to compromise a vulnerable system. PLATFORM: Versions 5.0.x, 5.1.x, and 5.2.x. ABSTRACT: Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia Advisory SA54372 CVE-2013-3443 CVE-2013-3444 IMPACT ASSESSMENT: High

72

T-679: VMware Security Advisory - VMSA-2011-0010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: VMware Security Advisory - VMSA-2011-0010 9: VMware Security Advisory - VMSA-2011-0010 T-679: VMware Security Advisory - VMSA-2011-0010 July 29, 2011 - 1:35pm Addthis PROBLEM: VMware ESX third party updates for Service Console packages glibc and dhcp PLATFORM: VMware Workstation, Player, ACE, Fusion ABSTRACT: The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process. Security Advisories & Certifications(VMSA-2011-0010) reference LINKS: CVE-2010-0296 CVE-2011-0536 CVE-2011-0997 CVE-2011-1071 CVE-2011-1095 IMPACT ASSESSMENT:

73

T-679: VMware Security Advisory - VMSA-2011-0010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: VMware Security Advisory - VMSA-2011-0010 9: VMware Security Advisory - VMSA-2011-0010 T-679: VMware Security Advisory - VMSA-2011-0010 July 29, 2011 - 1:35pm Addthis PROBLEM: VMware ESX third party updates for Service Console packages glibc and dhcp PLATFORM: VMware Workstation, Player, ACE, Fusion ABSTRACT: The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process. Security Advisories & Certifications(VMSA-2011-0010) reference LINKS: CVE-2010-0296 CVE-2011-0536 CVE-2011-0997 CVE-2011-1071 CVE-2011-1095 IMPACT ASSESSMENT:

74

T-600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

600: Security Advisory for Adobe Flash Player, Adobe Reader and 600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-600: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat April 12, 2011 - 5:19am Addthis PROBLEM: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat PLATFORM: A critical vulnerability exists in Flash Player 10.2.153.1 and earlier versions (Adobe Flash Player 10.2.154.25 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris, Adobe Flash Player 10.2.156.12 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2) and earlier 10.x and 9.x versions for Windows and Macintosh operating systems. ABSTRACT: This vulnerability (CVE-2011-0611) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports

75

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

76

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Routers (ISRs) Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs) Cisco Catalyst 3750G Integrated WLCs Cisco Flex 7500 Series Cloud Controller Cisco Virtual Wireless...

77

T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Security Advisory for Adobe Flash Player, Adobe Reader and 7: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat March 14, 2011 - 4:05pm Addthis PROBLEM: There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an email attachment. PLATFORM: Windows, Macintosh, Linux and Solaris ABSTRACT: A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.13 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris operating systems, Adobe Flash Player 10.1.106.16 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1)

78

U-054: Security Advisory for Adobe Reader and Acrobat | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Security Advisory for Adobe Reader and Acrobat 54: Security Advisory for Adobe Reader and Acrobat U-054: Security Advisory for Adobe Reader and Acrobat December 7, 2011 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader U3D Memory Corruption Error Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.6 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.6 and earlier 9.x versions for Windows and Macintosh ABSTRACT: This U3D memory corruption vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that the vulnerability is being actively

79

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

80

Corporate Headquarters Cisco Systems, Inc.  

E-Print Network (OSTI)

radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not installed. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University

Westall, James M.

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

82

U-021: Cisco Unified Communications Manager Directory Traversal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

83

T-703: Cisco Unified Communications Manager Open Query Interface...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets...

84

U-054: Security Advisory for Adobe Reader and Acrobat | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Security Advisory for Adobe Reader and Acrobat 4: Security Advisory for Adobe Reader and Acrobat U-054: Security Advisory for Adobe Reader and Acrobat December 7, 2011 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader U3D Memory Corruption Error Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.6 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.6 and earlier 9.x versions for Windows and Macintosh ABSTRACT: This U3D memory corruption vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that the vulnerability is being actively exploited in the wild in limited, targeted attacks against Adobe Reader 9.x

85

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

86

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let...

87

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

88

Cisco Wind Energy Wind Farm | Open Energy Information  

Open Energy Info (EERE)

Cisco Wind Energy Wind Farm Cisco Wind Energy Wind Farm Jump to: navigation, search Name Cisco Wind Energy Wind Farm Facility Cisco Wind Energy Sector Wind energy Facility Type Commercial Scale Wind Facility Status In Service Owner John Deere Wind Energy Developer Community Energy Purchaser Northern States Power Location Brewster MN Coordinates 43.696164°, -95.467078° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":43.696164,"lon":-95.467078,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

89

V-139: Cisco Network Admission Control Input Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common Services Home...

90

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

91

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

92

T-685: Cisco Warranty CD May Load Malware From a Remote Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

85: Cisco Warranty CD May Load Malware From a Remote Site T-685: Cisco Warranty CD May Load Malware From a Remote Site August 5, 2011 - 3:26pm Addthis PROBLEM: A vulnerability was...

93

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

94

T-552: Cisco Nexus 1000V VEM updates address denial of service in VMware  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Cisco Nexus 1000V VEM updates address denial of service in 52: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi T-552: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi February 8, 2011 - 7:49am Addthis PROBLEM: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi. PLATFORM: ESXi 4.1, ESXi 4.0, ESX 4.1, ESX 4.0 The following Cisco products have the vulnerability: - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3b) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3a) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(2) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(1) ABSTRACT: The Cisco Nexus 1000V Virtual Ethernet Module (VEM) is a virtual switch for

95

DOE Terminated Federal Advisory Committees  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMINATED FEDERAL ADVISORY COMMITTEES Date Committee Name/Web Site Terminated Federal Energy Management Advisory Committee 06/08/07 Web Site: (Environmental Management Site-Specific Advisory Board) Fernald 09/30/06 Web Site: (Environmental Management Site-Specific Advisory Board) Rocky Flats 09/30/06 Web Site: Secretary of Energy Advisory Board 05/20/06 Web Site: http://www.seab.energy.gov/ Electricity Advisory Board 02/10/06 Web Site: http://www.eab.doe.gov/ American Statistical Association Advisory Committee on Energy Statistics 03/24/05 Web Site: Workers' Compensation Assistance Advisory Committee 06/29/04 Web Site: National Nuclear Security Administration Advisory Committee 06/25/03 Web Site: Commission on Fire Safety and Preparedness 01/09/03

96

T-614: Cisco Unified Communications Manager Database Security Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerability is due to unspecified errors in the affected software that may allow the attacker to perform SQL injections. An authenticated, remote attacker could inject arbitrary SQL code on the system, allowing the attacker to take unauthorized actions.

97

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... security including, but not limited to: accreditation, audit trails, authorization ... US Department of Energy Computer Incident Advisory Capability (CIAC ...

98

U-016: Cisco IOS Software HTTP Service Loading Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The...

99

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates. http:energy.govcio...

100

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

The Federal Advisory Committee Act of 1972 | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. Department of Energy: Advisory Committee Charter, August 9, 2012 Policies and Procedures Information Security: Coordination of Federal Cyber Security Research and Development...

102

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 27, 2011 January 27, 2011 T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities. January 27, 2011 T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker

103

T-631: Cisco XR 12000 Series Shared Port Adapters Interface Processor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco XR 12000 Series Shared Port Adapters Interface 1: Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability T-631: Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability May 26, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR 12000. A remote user can cause denial of service conditions. PLATFORM: This vulnerability affects any device that is running Cisco IOS XR Software Releases 3.9.0, 3.9.1, 3.9.2, 4.0.0, 4.0.1, 4.0.2, or 4.1.0 and has a SPA interface processor installed. Vulnerability affects all Engine 5 Line Cards on the Cisco XR 12000 Series Routers. The engine 5 line cards are the SIP-600, SIP-601, SIP-501, and SIP-401. ABSTRACT: This vulnerability affects any device that is running affected releases of Cisco IOS XR Software and has an IPv4 address configured on any of the SPA

104

T-631: Cisco XR 12000 Series Shared Port Adapters Interface Processor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco XR 12000 Series Shared Port Adapters Interface 31: Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability T-631: Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability May 26, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR 12000. A remote user can cause denial of service conditions. PLATFORM: This vulnerability affects any device that is running Cisco IOS XR Software Releases 3.9.0, 3.9.1, 3.9.2, 4.0.0, 4.0.1, 4.0.2, or 4.1.0 and has a SPA interface processor installed. Vulnerability affects all Engine 5 Line Cards on the Cisco XR 12000 Series Routers. The engine 5 line cards are the SIP-600, SIP-601, SIP-501, and SIP-401. ABSTRACT: This vulnerability affects any device that is running affected releases of Cisco IOS XR Software and has an IPv4 address configured on any of the SPA

105

Control Systems Security Publications Library | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Technology Development Transmission Planning Smart Grid Energy Delivery Systems Cybersecurity Control Systems Security News Archive Control...

106

Venice Sustainability Advisory Panel  

E-Print Network (OSTI)

Venice Sustainability Advisory PanelFINAL REPORT Venice Sustainability Advisory Panel FinalInvestigator The Venice Sustainability Advisory Panel (

2009-01-01T23:59:59.000Z

107

ADVISORY: NNSA Releases Pictures, Video of Consequence Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Tuesday, March 15, 2011 ADVISORY: NNSA Releases Pictures, Video of Consequence Management Response Teams Deploying to Japan WASHINGTON, D.C. The National Nuclear Security...

108

DOE and Industry Showcase New Control Systems Security Technologies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Technology Development Transmission Planning Smart Grid Energy Delivery Systems Cybersecurity Control Systems Security News Archive Control...

109

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 23560 of 28,905 results. 51 - 23560 of 28,905 results. Article T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities. http://energy.gov/cio/articles/t-544-cisco-security-advisory-cisco-content-services-gateway-vulnerabilities-0 Page Recovery Act The Department estimates the $6 billion Recovery Act investment will allow

110

Safety Advisories  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety Advisories Safety Advisories 2010 2010-08 Safety Advisory - Software Quality Assurance Firmware Defect in Programmable Logic Controller 2010-07 Safety Advisory - Revised Counterfeit Integrated Circuits Indictment 2010-06 Safety Advisory - Counterfeit Integrated Circuits Indictment 2010-05 Safety Advisory - Contact with Overhead Lines and Ground Step Potential 2010-04 Update - Leaking Acetylene Cylinder Shutoff Valves 2010-03 - Software Quality Assurance Microsoft Excel Software Issue 2010-02 - Leaking Acetylene Cylinder Shutoff Valves 2010-01 Update - Defective Frangible Ammunition 2009 2009-05 Software Quality Assurance - Errors in MACCS2 x/Q Calculations 2009-04 Update - SEELER Exothermic Torch 2009-03 - Defective Frangible Ammunition 2009-02 - Recall of Defense Technology Distraction Devices

111

Advisory Board  

Science Conference Proceedings (OSTI)

... These values are derived from experience and lessons ... With this value in mind, the MEP Advisory ... the Chair, while away from their homes or regular ...

2013-06-28T23:59:59.000Z

112

Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee  

SciTech Connect

This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide and the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the research that must be done. For example, the applied research programs in the DOE need a greater awareness of the user facilities and an understanding of how to use them to solve their unique problems. The discussions reinforced what all of the participants already knew: the issue of energy security is of major importance both for the U.S. and for the world. Furthermore, it is clear that major changes in the primary energy sources, in energy conversion, and in energy use, must be achieved within the next fifty years. This time scale is determined by two drivers: increasing world population and increasing expectations of that population. Much of the research and development currently being done are concerned with incremental improvements in what has been done in the immediate past; and it is necessary to take this path because improvements will be needed across the board. These advances extend the period before the radical changes have to be made; however, they will not solve the underlying, long-range problem. The Subpanel recommends that a major program be funded to conduct a multidisciplinary research program to address the issues to ensure a secure energy future for the U.S. It is necessary to recognize that this program must be ensured of a long-term stability. It is also necessary that a management and funding structure appropriate for such an approach be developed. The Department of Energy's Office of Basic Energy Sciences is well positioned to support this initiative by enhancement of their already world-class scientific research programs and user facilities.

2003-02-01T23:59:59.000Z

113

Basic research needs to assure a secure energy future. A report from the Basic Energy Sciences Advisory Committee  

SciTech Connect

This report has highlighted many of the possible fundamental research areas that will help our country avoid a future energy crisis. The report may not have adequately captured the atmosphere of concern that permeated the discussions at the workshop. The difficulties facing our nation and the world in meeting our energy needs over the next several decades are very challenging. It was generally felt that traditional solutions and approaches will not solve the total energy problem. Knowledge that does not exist must be obtained to address both the quantity of energy needed to increase the standard of living world-wide and the quality of energy generation needed to preserve the environment. In terms of investments, it was clear that there is no single research area that will secure the future energy supply. A diverse range of economic energy sources will be required--and a broad range of fundamental research is needed to enable these. Many of the issues fall into the traditional materials and chemical sciences research areas, but with specific emphasis on understanding mechanisms, energy related phenomena, and pursuing novel directions in, for example, nanoscience and integrated modeling. An important result from the discussions, which is hopefully apparent from the brief presentations above, is that the problems that must be dealt with are truly multidisciplinary. This means that they require the participation of investigators with different skill sets. Basic science skills have to be complemented by awareness of the overall nature of the problem in a national and world context, and with knowledge of the engineering, design, and control issues in any eventual solution. It is necessary to find ways in which this can be done while still preserving the ability to do first-class basic science. The traditional structure of research, with specific disciplinary groupings, will not be sufficient. This presents great challenges and opportunities for the funders of the research that must be done. For example, the applied research programs in the DOE need a greater awareness of the user facilities and an understanding of how to use them to solve their unique problems. The discussions reinforced what all of the participants already knew: the issue of energy security is of major importance both for the U.S. and for the world. Furthermore, it is clear that major changes in the primary energy sources, in energy conversion, and in energy use, must be achieved within the next fifty years. This time scale is determined by two drivers: increasing world population and increasing expectations of that population. Much of the research and development currently being done are concerned with incremental improvements in what has been done in the immediate past; and it is necessary to take this path because improvements will be needed across the board. These advances extend the period before the radical changes have to be made; however, they will not solve the underlying, long-range problem. The Subpanel recommends that a major program be funded to conduct a multidisciplinary research program to address the issues to ensure a secure energy future for the U.S. It is necessary to recognize that this program must be ensured of a long-term stability. It is also necessary that a management and funding structure appropriate for such an approach be developed. The Department of Energy's Office of Basic Energy Sciences is well positioned to support this initiative by enhancement of their already world-class scientific research programs and user facilities.

None

2003-02-01T23:59:59.000Z

114

Electricity Advisory Committee, U.S. Department of Energy: Advisory...  

NLE Websites -- All DOE Office Websites (Extended Search)

Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2012 Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee...

115

Cisco Systems Funds "Whisker" Growth Research at the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Cisco Systems Funds "Whisker" Growth Cisco Systems Funds "Whisker" Growth Research at the ALS Cisco Systems Funds "Whisker" Growth Research at the ALS Print Friday, 09 November 2012 10:06 Lead-free components have been increasingly used in electronics manufacturing since the European Union passed its 2003 Restriction of Hazardous Substances Directive (RoHS), which banned the use of certain hazardous materials in electrical and electronic equipment. To ensure the long-term reliability of mission-critical equipment such as networking hardware, a significant amount of research and development must be undertaken by the industry to ensure lead-free (Pb-free) metallurgies are sufficiently reliable. One of the unique reliability issues associated with electroplated Pb-free lead finishes [typically pure tin (Sn) or high-Sn alloys] is the growth of "whiskers," which is the spontaneous growth of long filament-like grains on the leads, or "legs," of electronic components. If the growth of these whiskers is not controlled, shorting between the lead can occur and thus cause system failures.

116

Advisory Board Meets to Discuss EM Cleanup's Future | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory Board Meets to Discuss EM Cleanup's Future Advisory Board Meets to Discuss EM Cleanup's Future Advisory Board Meets to Discuss EM Cleanup's Future December 6, 2012 - 12:00pm Addthis EM Principal Deputy Assistant Secretary Tracy Mustin, second from right, speaks with members of the Environmental Management Advisory Board this week as EM Deputy Assistant Secretary, Safety, Security and Quality Programs, Matthew Moury, second from left, listens. EM Principal Deputy Assistant Secretary Tracy Mustin, second from right, speaks with members of the Environmental Management Advisory Board this week as EM Deputy Assistant Secretary, Safety, Security and Quality Programs, Matthew Moury, second from left, listens. WASHINGTON, D.C. - EM Principal Deputy Assistant Secretary Tracy Mustin this week sought guidance from the Environmental Management Advisory Board

117

T-586: Microsoft Advisory about fraudulent SSL Certificates | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

586: Microsoft Advisory about fraudulent SSL Certificates 586: Microsoft Advisory about fraudulent SSL Certificates T-586: Microsoft Advisory about fraudulent SSL Certificates March 23, 2011 - 3:05pm Addthis PROBLEM: Microsoft just released an advisory alerting its customers that a total of 9 certificates were issued using the leaked/stolen CA certificated from Comodo. PLATFORM: These certificates affect the following Web properties: login.live.com mail.google.com www.google.com login.yahoo.com (3 certificates) login.skype.com addons.mozilla.org "Global Trustee" ABSTRACT: Microsoft Advisory about fraudulent SSL Certificates. reference LINKS: Microsoft Security Advisory: 2524375 ISC 2011-03-23 Security updates IMPACT ASSESSMENT: High Discussion: Microsoft is aware of nine fraudulent digital certificates issued by Comodo, a certification authority present in the Trusted Root Certification

118

V-136: Oracle Critical Patch Update Advisory - April 2013 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Oracle Critical Patch Update Advisory - April 2013 6: Oracle Critical Patch Update Advisory - April 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 April 17, 2013 - 1:46am Addthis PROBLEM: Oracle Critical Patch Update Advisory - April 2013 PLATFORM: Oracle All Applicable Version(s) ABSTRACT: Several vulnerabilities addressed in this Critical Patch Update affect multiple products REFERENCE LINKS: Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: High DISCUSSION: A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier

119

V-004: Oracle Critical Patch Update Advisory - October 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Critical Patch Update Advisory - October 2012 4: Oracle Critical Patch Update Advisory - October 2012 V-004: Oracle Critical Patch Update Advisory - October 2012 October 17, 2012 - 6:00am Addthis PROBLEM: Oracle Critical Patch Update Advisory - October 2012 PLATFORM: Oracle All Applicable Version(s) ABSTRACT: October 2012 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. REFERENCE LINKS: Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: High DISCUSSION: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. IMPACT:

120

LBNL Community Advisory Group  

NLE Websites -- All DOE Office Websites (Extended Search)

to search page 7 - Privacy policy 8 - Terms of use 9 - Go to contactcomment page LBNL Community Advisory Group: HOME CALENDAR FEEDBACK HOME About the Community Advisory...

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

NSLS II Advisory Committees  

NLE Websites -- All DOE Office Websites (Extended Search)

Photon Sciences Advisory Committees Science Advisory Committee Harald Reichert, Chair, European Synchrotron Radiation Facility Simon Bare, UOP Jay Bass, University of Illinois...

122

Electricity Advisory Committee U.S. Department of Energy Advisory Committee Charter  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Advisory Committee Charter 1. Committee's Official Designation. Electricity Advisory Committee (EAC) 2. Authority. This charter establishes the Electricity Advisory Committee under the authority of the U.S. Department of Energy (DOE). The Electricity Advisory Committee (EAC) is being renewed in accordance with the provisions of the Federal Advisory Committee Act (FACA), as amended, 5 U.S.C., App. 2. 3. Objectives and Scope of Activities. The activities of the Committee include: * Advise on electricity reliability, security and policy issues of concern to the Department of Energy. * Periodically review and make recommendations on DOE electricity programs and initiatives, including electricity-related R&D programs.

123

Environmental Management Advisory Board Charter | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Communication & Engagement » EMAB » Environmental Services » Communication & Engagement » EMAB » Environmental Management Advisory Board Charter Environmental Management Advisory Board Charter The Environmental Management Advisory Board's (EMAB)'s most recent charter outlines the objective, structure, and scope of the Board. EMAB Charter More Documents & Publications SEAB Charter 2012 Methane Hydrate Advisory Committee Charter EM SSAB Charter Waste Management Nuclear Materials & Waste Tank Waste and Waste Processing Waste Disposition Packaging and Transportation Site & Facility Restoration Deactivation & Decommissioning (D&D) Facility Engineering Soil & Groundwater Sustainability Program Management Safety Security Quality Assurance Budget & Performance Acquisition Compliance Project Management

124

Electricity Advisory Committee, U.S. Department of Energy: Advisory...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2010 The charter of the reconstituted Electricity Advisory Committee for the...

125

Electricity Advisory Committee, U.S. Department of Energy: Advisory...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2010 Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9,...

126

Electricity Advisory Committee, U.S. Department of Energy: Advisory  

NLE Websites -- All DOE Office Websites (Extended Search)

Electricity Advisory Committee, U.S. Department of Energy: Advisory Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2012 Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2012 The charter of the Electricity Advisory Committee for the Department of Energy Advisory. The Electricity Advisory Committee (EAC) is established in accordance with the provisions of the Federal Advisory Committe Act (FACA). Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2012 More Documents & Publications Electricity Advisory Committee (EAC) 2008: Charter Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2010 Electricity Advisory Committee, U.S. Department of Energy: Advisory

127

New Electricity Advisory Committee Reports Delivered to the Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Electricity Advisory Committee Reports Delivered to the New Electricity Advisory Committee Reports Delivered to the Department of Energy New Electricity Advisory Committee Reports Delivered to the Department of Energy November 1, 2011 - 9:50am Addthis The Electricity Advisory Committee approved three new reports at their meeting on October 20, 2011. These reports include recommendations on cyber security, storage, and the interdependence of electricity and natural gas. Recommendations on U. S. Grid Security The Electricity Advisory Committee recommends that the Department of Energy take a more active, complementary role in the efforts of the North American Electric Reliability Corporation with respect to the Critical Infrastructure Strategic Roadmap developed by the Electricity Sub-Sector Coordinating Council and approved by the NERC Board of Trustees in November

128

Electricity Advisory Committee Notice of Open Meeting July 12, 2011:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Notice of Open Meeting July 12, Notice of Open Meeting July 12, 2011: Federal Register Notice Volume 76, No. 122 - Jun. 24, 2011 Electricity Advisory Committee Notice of Open Meeting July 12, 2011: Federal Register Notice Volume 76, No. 122 - Jun. 24, 2011 Electricity Advisory Committee Meeting. This notice announces a meeting of the reestablished Electricity Advisory Committee (EAC) on July 12, 2011. The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770) requires that public notice of these meetings be announced in the Federal Register. Electricity Advisory Committee More Documents & Publications Federal Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNL/NM) Electricity Advisory Committee Notice of Open Meeting October 2 and 3,

129

Energy Media Advisories | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy.gov » Energy Media Advisories Energy.gov » Energy Media Advisories Energy Media Advisories RSS September 23, 2009 Department of Energy Announces Accelerator Symposium WASHINGTON, D.C. -- On Monday, October 26, the U.S. Department of Energy's Office of Science will host a Symposium on Accelerators for America's Future in Washington, DC. The symposium--drawing participants from science, industry, medicine, and the national security community--will focus on challenges and opportunities in maximizing the potential of next-generation accelerator technologies to energize the U.S. economy, strengthen American competitiveness, and help the nation achieve more in science, industry, medicine, energy and the environment, and national security. previous 6 7 8 9 10 11 12 13 14 next Mission Leadership Staff and Contractors

130

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

131

Automating Network Security Assessment  

Science Conference Proceedings (OSTI)

... It's not host analysis It's not config analysis Page 6. ... Originally on ~$5K server (quad core, 32G RAM) Now running on Cisco UCS much faster! ...

2012-10-26T23:59:59.000Z

132

U-019: Oracle Critical Patch Update Advisory - October 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Oracle Critical Patch Update Advisory - October 2011 19: Oracle Critical Patch Update Advisory - October 2011 U-019: Oracle Critical Patch Update Advisory - October 2011 October 25, 2011 - 8:46am Addthis PROBLEM: Oracle Critical Patch Update Advisory - October 2011 . PLATFORM: Oracle All Applicable Version(s) ABSTRACT: October 2011 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. Reference LINKS: Oracle Critical Patch Update Advisory Oracle Risk Matrix JC3-CIRC Tech Bulletin U-014 Oracle Patch Table IMPACT ASSESSMENT: High Discussion: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative but each advisory describes only the security fixes added since the previous

133

Electricity Advisory Committee - Federal Register Notices | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Register Notices Electricity Advisory Committee - Federal Register Notices Electricity Advisory Committee - Federal Register Notices NOTICE OF OPEN ELECTRICITY ADVISORY...

134

Electricity Advisory Committee: 2008 Membership Roster | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee: 2008 Membership Roster Electricity Advisory Committee: 2008 Membership Roster Membership Roster of the 2008 Electricity Advisory Committee....

135

Electricity Advisory Committee (EAC) - 2012 Meetings | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services Electricity Advisory Committee Archived Meetings 2008-2012 Electricity Advisory Committee (EAC) - 2012 Meetings Electricity Advisory Committee (EAC) - 2012...

136

Federal Advisory Committee Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

State Energy Advisory Board (STEAB) Ultra-Deepwater Advisory Committee (UDAC) Unconventional Resources Technology Advisory Committee (URTAC) Inactive Committees Technical...

137

Safety Advisories  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

138

Nuclear Energy Advisory Committee | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services Nuclear Energy Advisory Committee Nuclear Energy Advisory Committee Nuclear Energy Advisory Committee Funding Opportunities Document Library The Nuclear Energy Advisory...

139

Electricity Advisory Committee, U.S. Department of Energy: Advisory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Committee, U.S. Department of Energy: Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2010 Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2010 The charter of the reconstituted Electricity Advisory Committee for the Department of Energy Advisory. The Electricity Advisory Committee (EAC) is being established in accordance with the provisions of the Federal Advisory Committe Act (FACA). Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2010 More Documents & Publications Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2012 Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2010

140

V-001: Mozilla Security vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Methane Hydrate Advisory Committee Charter | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Charter Methane Hydrate Advisory Committee Charter Methane Hydrate Advisory Committee Charter Methane Hydrate Advisory Committee Charter...

142

New Mexico Workforce Development Advisory Team Report  

SciTech Connect

This report documents the creation of a Workforce Development Advisory Team as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a description of the purpose of the advisory team and a list of team members with sector designations. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in incubator companies, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce. To achieve this goal, it will be necessary to determine the current state of the national security workforce and the educational efforts to train such a workforce. Strategies will be developed and implemented to address gaps and to make progress towards a strong, well-trained workforce available for current and future national security technology employers.

2007-12-31T23:59:59.000Z

143

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5:Oracle Java SE Critical Patch Update Advisory 5:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

144

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

05:Oracle Java SE Critical Patch Update Advisory 05:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

145

Science at its Best, Security at its Worst | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 18, 1999, President William J. Clinton requested that the President's Foreign Intelligence Advisory Board (PFIAB) undertake an inquiry and issue a report on "the security...

146

ALS Scientific Advisory Committee Charter  

NLE Websites -- All DOE Office Websites (Extended Search)

This document was revised and approved December 18, 2008. I. FUNCTION AND REPORTING The ALS Scientific Advisory Committee (SAC) is advisory to the Berkeley Lab Director through...

147

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:30 - 3:40 pm Welcome and Opening Comments Kevin Kolevar, Assistant Secretary for Electricity Delivery and Energy Reliability Linda Stuntz, Chair, Electricity Advisory Committee...

148

Graduate Student Advisory Council  

Science Conference Proceedings (OSTI)

Graduate Students for the GSAC (Graduate Student Advisory Council) ... At the TMS 2011 Annual Meeting, we will be voting on a secretary to fill this vacancy.

149

Beamline Advisory Committees  

NLE Websites -- All DOE Office Websites (Extended Search)

Beamline Advisory Committees 4-ID Dr. Dario Arena (Brookhaven National Lab, NSLS), chair Prof. Jaq Chakhalian ( Univesity of Arkansas) Dr. Axel Hoffmann ( Argonne National Lab,...

150

TIP Advisory Board  

Science Conference Proceedings (OSTI)

... The TIP Advisory Board reports on the general health of the Program and offers guidance on investment areas that are appropriate for TIP funding. ...

2012-07-17T23:59:59.000Z

151

NCEM Scientific Advisory Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

Advisory Committee Dr. Frances Ross, Chair IBM Prof. Alex King Ames Laboratory, Director Amanda Petford-Long Argonne National Laboratory Prof. Michael Isaacson University of...

152

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

153

USDA and DOE Biomass Research And Development Technical Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

USDA and DOE Biomass Research And Development Technical Advisory USDA and DOE Biomass Research And Development Technical Advisory Committee Members USDA and DOE Biomass Research And Development Technical Advisory Committee Members January 15, 2008 - 10:23am Addthis WASHINGTON, DC, January 15, 2008 - U.S. Department of Agriculture (USDA) Acting Secretary Chuck Conner and U.S. Department of Energy (DOE) Secretary Samuel Bodman today announced the appointment of six new members and the reappointment of seven members to serve on its Biomass Research and Development Technical Advisory Committee for a term of three years. The Committee was established by the Biomass Research and Development Act of 2000 to assist USDA and DOE in meeting important national goals for a healthier rural economy and improved national energy security.

154

USDA and DOE Biomass Research And Development Technical Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Biomass Research And Development Technical Advisory Biomass Research And Development Technical Advisory Committee Members USDA and DOE Biomass Research And Development Technical Advisory Committee Members January 15, 2008 - 10:23am Addthis WASHINGTON, DC, January 15, 2008 - U.S. Department of Agriculture (USDA) Acting Secretary Chuck Conner and U.S. Department of Energy (DOE) Secretary Samuel Bodman today announced the appointment of six new members and the reappointment of seven members to serve on its Biomass Research and Development Technical Advisory Committee for a term of three years. The Committee was established by the Biomass Research and Development Act of 2000 to assist USDA and DOE in meeting important national goals for a healthier rural economy and improved national energy security. The Committee provides expert advice on strategic planning; the technical

155

Electricity Advisory Committee Meeting Presentations March 2012 - Tuesday,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting Presentations March 2012 - Electricity Advisory Committee Meeting Presentations March 2012 - Tuesday, March 6, 2012 Electricity Advisory Committee Meeting Presentations March 2012 - Tuesday, March 6, 2012 The Department of Energy's Electricity Advisory Committee held a meeting on Monday, March 5 and Tuesday, March 6 at the Ronald Reagan Building, 1300 Pennsylvania Ave. NW, Washington, DC. Tuesday, March 6, 2012 OE's Infrastructure Security and Energy Restoration Division - Bill Bryan, Deputy Assistant Secretary for ISER OE's Research and Development Division's Smart Grid Program - Eric Lightner and Joe Paladino, OE R&D EAC Smart Grid Subcommittee Workplan - Wanda Reder, EAC Smart Grid Subcommittee Chair OE's Research and Development Division's Energy Storage Technologies Program - Imre Gyuk, OE R&D

156

Electricity Advisory Committee (EAC) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(EAC) Electricity Advisory Committee (EAC) Electricity Advisory Committee (EAC) EAC MISSION The mission of the Electricity Advisory Committee is to provide advice to the U.S....

157

Electricity Advisory Committee - 2013 Meetings | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2013 Meetings Electricity Advisory Committee - 2013 Meetings Electricity Advisory Committee - 2013 Meetings CANCELLED: OCTOBER 2 & 3, 2013 MEETING OF THE ELECTRICITY ADVISORY...

158

Electricity Advisory Committee: 2010 Membership Roster | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Committee: 2010 Membership Roster Electricity Advisory Committee: 2010 Membership Roster Roster of membership in the 2010 Electricity Advisory Committee. Electricity Advisory...

159

Methane Hydrate Advisory Committee Meeting Minutes | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Methane Hydrate Advisory Committee Meeting Minutes Methane Hydrate Advisory Committee Meeting Minutes Methane Hydrate Advisory Committee Meeting Minutes June 6th - 7th, 2013...

160

Electricity Advisory Committee - 2014 Meetings | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- 2014 Meetings Electricity Advisory Committee - 2014 Meetings Electricity Advisory Committee - 2014 Meetings JANUARY 24, 2014 TELECONFERENCE MEETING OF THE ELECTRICITY ADVISORY...

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

T-628: Debian APR Library Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

162

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

163

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of Michigan Gregorg Garcia, Garcia Cyber Partners Brian ... explained how the transformation is executed - DoD is transforming IA policies ...

2013-03-08T23:59:59.000Z

164

Information Security and Privacy Advisory Board (ISPAB)  

Science Conference Proceedings (OSTI)

... Institute of Standards and Technology (NIST), the Secretary of Commerce and the Director of the Office of Management and Budget on information ...

2013-01-15T23:59:59.000Z

165

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... Enhance user interface with REST design, Migrate database and web ... E-Gov Update Lisa Schlosser, Deputy CIO, Federal Government, OMB ...

2013-03-11T23:59:59.000Z

166

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of Intellectual Property's negative impact on jobs Economic losses ... of framework (heavy lift), creation of overlays ... Wisham Lorna First Energy visitor ...

2013-06-19T23:59:59.000Z

167

Nuclear / Radiological Advisory Team | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

advice for both domestic and international nuclear or radiological incidents. It is led by a Senior Energy Official who runs the NNSA field operation and who coordinates NNSA...

168

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... does not become unclassified and does not leave CSP. ... can change and have a big impact, specifically on ... but is there one large weather map or ...

2013-12-24T23:59:59.000Z

169

U-215: Oracle Critical Patch Update Advisory - July 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Critical Patch Update Advisory - July 2012 5: Oracle Critical Patch Update Advisory - July 2012 U-215: Oracle Critical Patch Update Advisory - July 2012 July 18, 2012 - 7:00am Addthis PROBLEM: Cumulative security patches for Oracle Critical Patch Update Advisory - July 2012 PLATFORM: Oracle Database, Oracle Fusion Middleware, Oracle Secure Backup, Oracle Application Server, Oracle Identity Management 10g, Hyperion BI, Oracle JRockit versions, Oracle Outside In Technology, Fusion Middleware, Enterprise Manager, Oracle E-Business Suite Applications, Oracle Transportation Management, Supply Chain, Oracle AutoVue, Oracle PeopleSoft Enterprise, Oracle Siebel CRM, Oracle Clinical Remote Data Capture Option, Oracle Sun Product Suite, Oracle MySQL Server ABSTRACT: Critical Patch Updates are the primary means of releasing security fixes

170

T-605: Oracle Critical Patch Update Advisory - April 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Critical Patch Update Advisory - April 2011 5: Oracle Critical Patch Update Advisory - April 2011 T-605: Oracle Critical Patch Update Advisory - April 2011 April 19, 2011 - 4:13am Addthis PROBLEM: Oracle Critical Patch Update Advisory - April 19 2011. PLATFORM: Oracle Database, Oracle Fusion Middleware, Oracle Enterprise Manager Grid Control, Oracle E-Business Suite Applications, JD Edwards EnterpriseOne, JD Edwards OneWorld Tools, PeopleSoft Enterprise Portal Applications, PeopleSoft Enterprise PeopleTools, Siebel Enterprise, Oracle Industry Applications and Oracle VM patches. ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required because of interdependencies by those security patches. Critical Patch Updates are cumulative.

171

T-672: Oracle Critical Patch Update Advisory - July 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

672: Oracle Critical Patch Update Advisory - July 2011 672: Oracle Critical Patch Update Advisory - July 2011 T-672: Oracle Critical Patch Update Advisory - July 2011 July 20, 2011 - 1:34pm Addthis PROBLEM: Oracle Critical Patch Update Advisory - July 2011 PLATFORM: Affected Products and Components ABSTRACT: Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 78 new security fixes across all product families. Critical Patch Updates and Security Alerts Security Alerts reference LINKS: Oracle Fusion Middleware Risk Matrix Oracle Database Server Risk Matrix Oracle Enterprise Manager Grid Control Risk Matrix Oracle E-Business Suite Risk Matrix Oracle PeopleSoft Products Risk Matrix Oracle Sun Products Suite Risk Matrix

172

Centers for manufacturing technology: Industrial Advisory Committee Review  

Science Conference Proceedings (OSTI)

An advisory committee, composed of senior managers form industrial- sector companies and major manufacturing trade associations and representatives from appropriate educational institutions, meets semi-annually to review and advise the Oak Ridge Centers for Manufacturing Technology (ORCMT) on its economic security program. Individual papers have been indexed separately for the database.

NONE

1995-10-01T23:59:59.000Z

173

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2011 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates. May 31, 2011

174

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

175

Nuclear Energy Research Advisory Subcommittee Meeting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to the Minutes for the to the Minutes for the Nuclear Energy Research Advisory Subcommittee Meeting September 30 to October 1, 2002 MEMORANDUM To: Chairman, Nuclear Energy Research Advisory Committee (NERAC) From: Thomas B. Cochran, Member of NERAC Date: October 16, 2002 Subject: "A Technology Roadmap on Generation IV Nuclear Energy Systems," a report of the NERAC Subcommittee on Generation IV Technology Planning Please include these additional remarks in your transmittal of the subject report to DOE's Office of Nuclear Energy, Science and Technology. Perhaps the greatest security threat to the United States today, and of paramount concern to American citizens since September 11, 2001, is that nuclear weapon- usable materials will be stolen, seized, or secretly diverted from nuclear facilities and then used by

176

LBNL Community Advisory Group  

NLE Websites -- All DOE Office Websites (Extended Search)

page 1 - Go to home page 2 - Go to search page 7 - Privacy policy 8 - Terms of use 9 - Go to contactcomment page LBNL Community Advisory Group: HOME CALENDAR...

177

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18, 2013 18, 2013 V-137: Apple Mac OS X update for Java Apple has issued an update for Java for Mac OS X April 17, 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 Several vulnerabilities addressed in this Critical Patch Update affect multiple products April 16, 2013 V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. April 15, 2013 V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. April 14, 2013 V-133: Microsoft pulls Patch Tuesday security fix Microsoft has recommended that an update released in the latest Patch Tuesday be removed, after users reported incidents of the "blue screen of

178

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

179

Smart Grid Federal Advisory Committee  

Science Conference Proceedings (OSTI)

NIST Director's Update Smart Grid Federal Advisory Committee ... NAESB Standardized Energy Usage Information Model [PAP10] ... Standards Policy ...

2013-01-09T23:59:59.000Z

180

Environmental Management Advisory Board (EMAB) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) Environmental Management Advisory Board (EMAB) MISSION The mission of the Environmental Management Advisory Board is to provide independent and external advice, information, and recommendations to the

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

APS Scientific Advisory Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

Scientific Advisory Committee (SAC) Scientific Advisory Committee (SAC) The SAC is responsible for advising the APS Associate Laboratory Director in the following areas: To evaluate the scientific output and facility utilization for all APS sectors. To examine performance and recommend appropriate beamtime allocation for existing Collaborative Access Teams (CATs). To evaluate Letters of Intent and scientific proposals for new and reconstituted CATs. To provide advice to and review decisions by APS management on special operations support for CATs. To review Special Program proposals, a new mode of access that will guarantee 10-30% the beam time per year on any sector for a finite period of time. To assist the APS with development of policies and other issues as appropriate. SAC members Participants in the Scientific Advisory Committee.

182

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting Electricity Advisory Committee Meeting Sheraton National Hotel May 20, 2008 Minutes Members Present: Linda Stuntz, Esquire, Stuntz, Davis, and Staffier, P.C. (Chair) Yakout Mansour, California ISO (Vice Chair) Paul J. Allen, Constellation Energy Guido Bartels, IBM Gerry Cauley, SERC Reliability Corporation Jose Delgado, American Transmission Company The Honorable Jeanne Fox, New Jersey Board of Public Utilities Rob Gramlich, American Wind Energy Association The Honorable Dian Grueneich, California Public Utilities Commission Michael Heyeck, American Electric Power Hunter Hunt, Sharyland Utilities Susan Kelly, American Public Power Association Irwin Kowenski, Occidental Energy Ventures Corporation Barry Lawson, National Rural Electric Cooperative Association

183

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08 Membership Roster 08 Membership Roster Linda Stuntz, Esquire Chair of the Electricity Advisory Committee Stuntz, Davis & Staffier, P.C. Paul J. Allen Constellation Energy Guido Bartels IBM Gerry Cauley SERC Reliability Corporation Ralph Cavanagh Natural Defense Resources Council Jose Delgado American Transmission Company The Honorable Jeanne Fox New Jersey Board of Public Utilities Joseph Garcia National Congress of American Indians Robert Gramlich American Wind Energy Association The Honorable Dian Grueneich California Public Utilities Commission Michael Heyeck American Electric Power Hunter Hunt Sharyland Utilities, LLP Susan Kelly American Public Power Association Yakout Mansour Vice-Chair of the Electricity Advisory Committee California Independent System Operator

184

ADVISORY ALERT: Dekker, Ltd. Digital Signature - PARS II Reporting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ADVISORY ALERT: Dekker, Ltd. Digital Signature - PARS II Reporting ADVISORY ALERT: Dekker, Ltd. Digital Signature - PARS II Reporting As you know, to run reports in the PARS II, users must install an active X control to their workstations. The FIRST TIME a user attempts to run a report after installing the Active X control, a Security Warning will appear stating: That warning appears because, although the digital signature is valid, the digital signature is from a publisher (in this case Dekker, Ltd.) whom you have not yet chosen to trust. The following steps instruct you how to clear the security warning so that you may continue working with PARS II reports. Please note: Once you complete the process of accepting the Dekker, LTd. digital signature, this warning will not re-appear. This process must be done ONCE to "inform" your PC that Dekker, LTd. is an

185

National Climate Assessment and Development Advisory Committee...  

NLE Websites -- All DOE Office Websites (Extended Search)

National Climate Assessment and Development Advisory Committee (NCADAC) Print E-mail National Climate Assessment and Development Advisory Committee (NCADAC) pdf | html A Notice by...

186

National Climate Assessment and Development Advisory Committee...  

NLE Websites -- All DOE Office Websites (Extended Search)

National Climate Assessment and Development Advisory Committee (NCADAC); Notice of Open Meeting (6122013) Print E-mail National Climate Assessment and Development Advisory...

187

Electricity Advisory Committee (EAC) 2008: Charter | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Charter Electricity Advisory Committee (EAC) 2008: Charter Charter reflecting the Electricity Advisory Committee's objectives and scope of activities and duties Electricity...

188

Electricity Advisory Committee (EAC) - 2008 Meetings | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Archived Meetings 2008-2012 Electricity Advisory Committee (EAC) - 2008 Meetings Electricity Advisory Committee (EAC) - 2008 Meetings DECEMBER 11, 2008 MEETING OF THE...

189

Electricity Advisory Committee (EAC) 2012 Membership Roster ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Membership Roster Electricity Advisory Committee (EAC) 2012 Membership Roster 2012 Membership roster for the Electricity Advisory Committee as of June 5, 2012. Electricity...

190

Electricity Advisory Committee Meeting Presentations June 2013...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wednesday, June 5, 2013 Electricity Advisory Committee Meeting Presentations June 2013 - Wednesday, June 5, 2013 The Department of Energy's Electricity Advisory Committee held a...

191

Electricity Advisory Committee Meeting Presentations October...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 - Monday, October 15, 2012 Electricity Advisory Committee Meeting Presentations October 2012 - Monday, October 15, 2012 The Department of Energy's Electricity Advisory Committee...

192

Electricity Advisory Committee Meeting Presentations March 2012...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Monday, March 5, 2012 Electricity Advisory Committee Meeting Presentations March 2012 - Monday, March 5, 2012 The Department of Energy's Electricity Advisory Committee held a...

193

Electricity Advisory Committee Meeting Presentations June 2013...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Thursday, June 6, 2013 Electricity Advisory Committee Meeting Presentations June 2013 - Thursday, June 6, 2013 The Department of Energy's Electricity Advisory Committee held a...

194

Electricity Advisory Committee Meeting Presentations March 2012...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tuesday, March 6, 2012 Electricity Advisory Committee Meeting Presentations March 2012 - Tuesday, March 6, 2012 The Department of Energy's Electricity Advisory Committee held a...

195

Electricity Advisory Committee (EAC) - 2010 Meeting | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Archived Meetings 2008-2012 Electricity Advisory Committee (EAC) - 2010 Meeting Electricity Advisory Committee (EAC) - 2010 Meeting OCTOBER 29, 2010 MEETING OF THE ELECTRICITY...

196

Methane Hydrate Advisory Committee Meeting Minutes | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2013 Washington, DC July 16, 2013 Meeting Minutes More Documents & Publications Methane Hydrate Advisory Committee Meeting Minutes Electricity Advisory Committee Notice of Open...

197

Electricity Advisory Committee Meeting Presentations June 2012...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting Presentations June 2012 - Tuesday, June 12, 2012 Electricity Advisory Committee Meeting Presentations June 2012 - Tuesday, June 12, 2012 The...

198

Electricity Advisory Committee Meeting Presentations March 2012...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting Presentations March 2012 - Monday, March 5, 2012 Electricity Advisory Committee Meeting Presentations March 2012 - Monday, March 5, 2012 The...

199

User Advisory Council | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Resources & Expertise Mira Cetus Vesta Intrepid Challenger Surveyor Visualization Clusters Data and Networking Our Teams User Advisory Council User Advisory Council The User...

200

Electricity Advisory Committee (EAC) - Archived Meetings 2008...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(EAC) - Archived Meetings 2008 - 2013 Electricity Advisory Committee (EAC) - Archived Meetings 2008 - 2013 Past meetings of the Electricity Advisory Committee (EAC) 2013 Meetings:...

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Electricity Advisory Committee (EAC) 2013 Membership Roster:...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Membership Roster: December 15, 2013 Electricity Advisory Committee (EAC) 2013 Membership Roster: December 15, 2013 2013 Membership roster for the Electricity Advisory Committee...

202

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

203

Smart Grid Federal Advisory Committee  

Science Conference Proceedings (OSTI)

Advisory Committee Information: Cuong Nguyen Secretariat 301-975-2254 Telephone 301-975-4091 Facsimile cuongn@nist.gov 100 Bureau Drive ...

2013-05-09T23:59:59.000Z

204

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 18, 2011 T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device. February 17, 2011 T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via

205

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2011 20, 2011 T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. January 19, 2011 T-537: Oracle Critical Patch Update Advisory - January 2011 A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required because of interdependencies by those security patches. Critical Patch Updates are cumulative. January 18, 2011 T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on

206

LBNL Community Advisory Group  

NLE Websites -- All DOE Office Websites (Extended Search)

Organizing Framework Organizing Framework CAG Organizing Framework The Community Advisory Group Organizing Framework is composed of three primary components: CAG Purpose and Charge CAG Member Responsibilities Operating Principles CAG Membership and Participation Download a pdf of the CAG Organizing Framework. Purpose and Charge The purpose of the LBNL Community Advisory Group (CAG) is to provide input into the Lab's physical plans and development projects. The specific charge to this group is to: Advise LBNL staff on issues related to the environmental impacts of proposed planning and development projects; Articulate key community planning and design principles to be considered in the review of individual projects as well as to guide the physical development of LBNL overall; Identify recommended strategies and actions for addressing community

207

Energy Media Advisories  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

media-advisories-archive 1000 Independence Ave. SW media-advisories-archive 1000 Independence Ave. SW Washington DC 20585 202-586-5000 en In Charleston, U.S. Energy Department, Clemson Officials to Celebrate First-of-its-Kind Wind Testing Facility http://energy.gov/articles/charleston-us-energy-department-clemson-officials-celebrate-first-its-kind-wind-testing In Charleston, U.S. Energy Department, Clemson Officials to Celebrate First-of-its-Kind Wind Testing Facility

208

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 3, 2011 Page 1 October 3, 2011 Page 1 Electricity Advisory Committee Meeting National Rural Electric Cooperative Association Headquarters 4301 Wilson Boulevard Arlington, VA Agenda October 19, 2011 2:00 - 5:00 pm EDT 1:30 - 2:00 pm Registration 2:00 - 2:15 pm WELCOME and Introductions Richard Cowart, Chair, Electricity Advisory Committee Patricia Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, U.S. Department of Energy (DOE) 2:15 - 3:15 pm Presentation on U.S. Department of Energy's Vision of a Future Grid Bill Parks, Senior Advisor, DOE Office Electricity Delivery and Energy Reliability 3:15 - 3:30 pm Break 3:30 - 4:15 pm Response to U.S. Department of Energy's Vision of a Future Grid Honorable Robert Curry, Commissioner, New York State Public Service

209

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

210

Ash cloud aviation advisories  

SciTech Connect

During the recent (12--22 June 1991) Mount Pinatubo volcano eruptions, the US Air Force Global Weather Central (AFGWC) requested assistance of the US Department of Energy`s Atmospheric Release Advisory Capability (ARAC) in creating volcanic ash cloud aviation advisories for the region of the Philippine Islands. Through application of its three-dimensional material transport and diffusion models using AFGWC meteorological analysis and forecast wind fields ARAC developed extensive analysis and 12-hourly forecast ash cloud position advisories extending to 48 hours for a period of five days. The advisories consisted of ``relative`` ash cloud concentrations in ten layers (surface-5,000 feet, 5,000--10,000 feet and every 10,000 feet to 90,000 feet). The ash was represented as a log-normal size distribution of 10--200 {mu}m diameter solid particles. Size-dependent ``ashfall`` was simulated over time as the eruption clouds dispersed. Except for an internal experimental attempt to model one of the Mount Redoubt, Alaska, eruptions (12/89), ARAC had no prior experience in modeling volcanic eruption ash hazards. For the cataclysmic eruption of 15--16 June, the complex three-dimensional atmospheric structure of the region produced dramatically divergent ash cloud patterns. The large eruptions (> 7--10 km) produced ash plume clouds with strong westward transport over the South China Sea, Southeast Asia, India and beyond. The low-level eruptions (< 7 km) and quasi-steady-state venting produced a plume which generally dispersed to the north and east throughout the support period. Modeling the sequence of eruptions presented a unique challenge. Although the initial approach proved viable, further refinement is necessary and possible. A distinct need exists to quantify eruptions consistently such that ``relative`` ash concentrations relate to specific aviation hazard categories.

Sullivan, T.J.; Ellis, J.S. [Lawrence Livermore National Lab., CA (United States); Schalk, W.W.; Nasstrom, J.S. [EG and G, Inc., Pleasanton, CA (United States)

1992-06-25T23:59:59.000Z

211

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2011 1: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

212

Secretary of Energy Advisory Board U.S. Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy Advisory Committee Charter 1. Committee's Official Designation. Secretary of Energy Advisory Board (SEAB). 2. Authority. This charter establishes the Secretary of Energy Advisory Board (SEAB or the Board) under the authority of the U.S. Department of Energy (DOE). SEAB is being renewed in accordance with the provisions of the Federal Advisory Committee Act (FACA), as amended, 5 U.S.C. App. 2. 3. Objectives and Scope of Activities. The Board will provide advice and recommendations to the Secretary of Energy on the Department's basic and applied research and development activities, economic and national security policy, educational issues, operational issues, and on any other activities and operations of the Department of Energy as the Secretary may direct.

213

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Oracle Java SE Critical Patch Update Advisory - June 2011 41: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

214

Leaders of DOE Environmental Management Advisory Group to Meet in Henderson  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leaders of DOE Environmental Management Advisory Group to Meet in Leaders of DOE Environmental Management Advisory Group to Meet in Henderson Leaders of DOE Environmental Management Advisory Group to Meet in Henderson April 6, 2011 - 12:00pm Addthis Media Contacts Darwin J. Morgan 702-295-3521 morgan@nv.doe.gov Kelly Snyder 702-295-3521 snyderk@nv.doe.gov The Chairs and Vice-Chairs of the U.S. Department of Energy's (DOE) Environmental Management (EM) Site-Specific Advisory Board (SSAB) will meet in Henderson, NV, April 13-14, at Green Valley Ranch located at 2300 Paseo Verde Parkway. Twice each year representatives from the eight local boards of the EM SSAB meet with DOE-EM officials to discuss common issues and concerns. The spring meeting will include a tour of the Nevada National Security Site on April 12 and a day and a half business meeting on Wednesday and

215

Leaders of DOE Environmental Management Advisory Group to Meet in North Las  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leaders of DOE Environmental Management Advisory Group to Meet in Leaders of DOE Environmental Management Advisory Group to Meet in North Las Vegas Leaders of DOE Environmental Management Advisory Group to Meet in North Las Vegas June 8, 2011 - 12:00pm Addthis Media Contacts Darwin Morgan 702-295-3521 morgan@nv.doe.gov Kelly Snyder 702-295-3521 snyderk@nv.doe.gov Nevada Site Office News - The Chairs and Vice-Chairs of the U.S. Department of Energy's (DOE) Environmental Management (EM) Site-Specific Advisory Board (SSAB) will meet in North Las Vegas, Nevada, June 15-16, at Aliante Station Hotel located at 7300 Aliante Parkway. Twice each year representatives from the eight local boards of the EM SSAB meet with DOE-EM officials to discuss common issues and concerns. The spring meeting will include a tour of the Nevada National Security Site

216

Electricity Advisory Committee Meeting Agenda, July 12, 2011...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting Agenda, July 12, 2011 Electricity Advisory Committee Meeting Agenda, July 12, 2011 Agenda for the July 12, 2011 Electricity Advisory...

217

Electricity Advisory Committee Meeting, September 25, 2008: Minutes...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting, September 25, 2008: Minutes Electricity Advisory Committee Meeting, September 25, 2008: Minutes Minutes of the Electricity Advisory...

218

Ultra-Deepwater Advisory Committee Members | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory Committee Members Petroleum Reserves International Cooperation Natural Gas Regulation Advisory Committees 2011-2013 Ultra-Deepwater Advisory Committee Members Dr....

219

2013 Secretary of Energy Advisory Board Members | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Secretary of Energy Advisory Board Members 2013 Secretary of Energy Advisory Board Members 2013 Advisory Board Members John Deutch MIT Chemist, Former Under Secretary of Energy...

220

July 12, 2011 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 12, 2011 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE July 12, 2011 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE July 12, 2011 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE...

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Methane Hydrate Advisory Committee Meeting Minutes, June 6th...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Methane Hydrate Advisory Committee Meeting Minutes, June 6th-7th, 2013 Methane Hydrate Advisory Committee Meeting Minutes, June 6th-7th, 2013 Methane Hydrate Advisory Committee...

222

Methane Hydrate Advisory Committee Meeting Minutes, October 2011...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 2011 Methane Hydrate Advisory Committee Meeting Minutes, October 2011 Methane Hydrate Advisory Committee Meeting Minutes October 2011 Washington, DC Advisory Committee...

223

Methane Hydrate Advisory Committee Meeting Minutes, January 2010...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 2010 Methane Hydrate Advisory Committee Meeting Minutes, January 2010 Methane Hydrate Advisory Committee Meeting Minutes January, 2010 Atlanta, GA Methane Hydrate Advisory...

224

METHANE HYDRATE ADVISORY COMMITTEE U.S. DEPARTMENT OF ENERGY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

METHANE HYDRATE ADVISORY COMMITTEE U.S. DEPARTMENT OF ENERGY Advisory Committee Charter 1. Committee's Official Designation. Methane Hydrate Advisory Committee (MHAC) 2. Authority....

225

Methane Hydrate Advisory Committee Meeting Minutes, March 2010...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 2010 Methane Hydrate Advisory Committee Meeting Minutes, March 2010 Methane Hydrate Advisory Committee Meeting Minutes March 2010 Washington, DC Methane Hydrate Advisory...

226

NEHRP - Advisory Committee on Earthquake Hazards ...  

Science Conference Proceedings (OSTI)

NEHRP logo National Earthquake Hazards Reduction Program. ... Advisory Committee on Earthquake Hazards Reduction. Highlights. ...

227

Technical Advisory Committee to Develop a Federal ...  

Science Conference Proceedings (OSTI)

Technical Advisory Committee to Develop a Federal Information Processing Standard for the Federal Key Management Infrastructure. ...

228

Scientific Alternative Investment Advisory Partners | Open Energy  

Open Energy Info (EERE)

Scientific Alternative Investment Advisory Partners Scientific Alternative Investment Advisory Partners Jump to: navigation, search Name Scientific Alternative Investment Advisory Partners Place Frankfurt, Germany Zip 60325 Sector Renewable Energy Product String representation "SCAIAP speciali ... aned companies." is too long. References Scientific Alternative Investment Advisory Partners[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Scientific Alternative Investment Advisory Partners is a company located in Frankfurt, Germany . References ↑ "Scientific Alternative Investment Advisory Partners" Retrieved from "http://en.openei.org/w/index.php?title=Scientific_Alternative_Investment_Advisory_Partners&oldid=350688

229

U-150: Oracle Critical Patch Update Advisory - April 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-150: Oracle Critical Patch Update Advisory - April 2012 U-150: Oracle Critical Patch Update Advisory - April 2012 U-150: Oracle Critical Patch Update Advisory - April 2012 April 18, 2012 - 8:43am Addthis PROBLEM: Cumulative security patches for Oracle products has been released for April 17, 2012 PLATFORM: The Oracle Database, Oracle Fusion Middleware Oracle Enterprise Manager Grid Control, Oracle E-Business Suite Applications JD Edwards EnterpriseOne, JD Edwards OneWorld Tools PeopleSoft Enterprise Portal Applications, PeopleSoft Enterprise PeopleTools Siebel Enterprise, Industry Applications FLEXCUBE, Primavera and Oracle VM ABSTRACT: Critical Patch Updates are the primary means of releasing security fixes for Oracle products to customers with valid support contracts. They are released on the Tuesday closest to the 17th day of January, April, July and

230

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 20, 2012 December 20, 2012 Electricity Advisory Committee 2012 Membership Roster Richard Cowart Regulatory Assistance Project CHAIR Irwin Popowsky Pennsylvania Consumer Advocate (Ret.) VICE CHAIR William Ball Southern Company Linda Blair ITC Holdings Corporation Rick Bowen Alcoa Merwin Brown California Institute for Energy and Environment Ralph Cavanagh Natural Resources Defense Council Paul Centolella Analysis Group The Honorable Robert Curry New York State Public Service Commission Clark Gellings Electric Power Research Institute Dian Grueneich Dian Grueneich Consulting, LLC. Michael Heyeck American Electric Power Paul Hudson Stratus Energy Group Val Jensen Commonwealth Edison Susan Kelly American Public Power Association Barry Lawson

231

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 5, 2012 June 5, 2012 Electricity Advisory Committee 2012 Membership Roster Richard Cowart Regulatory Assistance Project CHAIR Irwin Popowsky Pennsylvania Consumer Advocate VICE CHAIR William Ball Southern Company Guido Bartels IBM Rick Bowen Alcoa Merwin Brown California Institute for Energy and Environment Ralph Cavanagh Natural Resources Defense Council The Honorable Paul Centolella Public Utilities Commission of Ohio David Crane NRG Energy, Inc. The Honorable Robert Curry New York State Public Service Commission José Delgado American Transmission Company (Ret.) Clark Gellings Electric Power Research Institute Robert Gramlich American Wind Energy Association Dian Grueneich Dian Grueneich Consulting, LLC. Michael Heyeck American Electric Power

232

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 17, 2010 1 September 17, 2010 1 Electricity Advisory Committee 2010 Membership Roster Richard Cowart Regulatory Assistance Project CHAIR Honorable Lauren Azar Wisconsin Public Utilities Commission VICE CHAIR Guido Bartels IBM Rick Bowen Alcoa Fred Butler Salmon Ventures Ltd. and New Jersey Board of Public Utilities (Ret.) Ralph Cavanagh Natural Resources Defense Council Lisa Crutchfield National Grid USA Honorable Robert Curry New York State Public Service Commission José Delgado American Transmission Company (Ret.) Roger Duncan Austin Energy (Ret.) Robert Gramlich American Wind Energy Association Honorable Dian Grueneich California Public Utilities Commission Michael Heyeck American Electric Power Joseph Kelliher NextEra Energy, Inc.

233

Nuclear Power Advisory Meeting  

Science Conference Proceedings (OSTI)

This document combines the material previously included in the Instrumentation and Control (I&C) Briefing Book for the Nuclear Power Advisory Meeting (Electric Power Research Institute report 1023444) with the annual I&C Research Plan, replacing the latter document. This document contains key information on the I&C program and its projects, including: 1. A program executive summarya high-level document on the key activities of the I&C base program as well as its three supplemental groups 2. A consolidate...

2012-01-19T23:59:59.000Z

234

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

235

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

236

Federal Advisory Committee Management | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Advisory Committee Management Federal Advisory Committee Management Federal Advisory Committee Management The Federal Advisory Committee Management Program assures the Department of Energy's overall compliance with the Federal Advisory Committee Act (FACA). The program is located in the Office of the Executive Secretariat. Federal Advisory Committee Act The Federal Advisory Committee Act of 1972 (Public Law 92-463) establishes the policies and minimum requirements for Federal agencies to manage and administer advisory committees. Advisory committee membership must be fairly balanced in relation to the points-of-view represented and the functions to be performed. Congress enacted the FACA to formally recognize the merits of seeking the advice and assistance of our Nation's citizens. Congress sought to assure

237

Electricity Advisory Committee Meeting Presentations March 2012 - Tuesday,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 2012 - March 2012 - Tuesday, March 6, 2012 Electricity Advisory Committee Meeting Presentations March 2012 - Tuesday, March 6, 2012 The Department of Energy's Electricity Advisory Committee held a meeting on Monday, March 5 and Tuesday, March 6 at the Ronald Reagan Building, 1300 Pennsylvania Ave. NW, Washington, DC. Tuesday, March 6, 2012 OE's Infrastructure Security and Energy Restoration Division - Bill Bryan, Deputy Assistant Secretary for ISER OE's Research and Development Division's Smart Grid Program - Eric Lightner and Joe Paladino, OE R&D EAC Smart Grid Subcommittee Workplan - Wanda Reder, EAC Smart Grid Subcommittee Chair OE's Research and Development Division's Energy Storage Technologies Program - Imre Gyuk, OE R&D EAC Energy Storage Technologies Subcommittee 2012 Work Plan - Ralph

238

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

239

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 29, 2010 October 29, 2010 8:00 am - 3:00 pm EST 7:30-8:00 am Continental Breakfast and Networking (EAC members only) 8:00 - 8:30 am Induction of the Special Government Employees (SGEs); SGEs will go to a nearby room for swearing-in and 15-minute ethics briefing EAC Member Group picture to be taken 8:30 - 8:45 am WELCOME Cathy Zoi, Under Secretary, U.S. Department of Energy (DOE) 8:45 - 9:00 am DOE OFFICE OF ELECTRICITY DELIVERY AND RELIABILITY -- STRUCTURE AND JURISDICTION Patricia Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, DOE 9:00 - 9:15 am GOALS OF ELECTRICITY ADVISORY COMMITTEE (EAC) Richard Cowart, EAC Chair and Principal, Regulatory Assistance

240

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Meeting Agenda Thursday, September 25, 2008 Reagan International Building 1300 Pennsylvania, NW Washington, D.C. 20004 (All times are EDT) 2:30 - 3:30 pm Registration 3:30 pm Committee Meeting Convenes 3:30 - 3:40 pm Welcome and Opening Comments Kevin Kolevar, Assistant Secretary for Electricity Delivery and Energy Reliability Linda Stuntz, Chair, Electricity Advisory Committee 3:40 - 5:50 pm Presentation and Discussion of Draft Committee Report on Electricity Supply Adequacy 5:50 - 6:00 pm Committee Housekeeping Announcements 6:00 pm Committee Meeting Recesses Friday, September 26, 2008 L'Enfant Plaza Hotel 480 L'Enfant Plaza, SW Washington, D.C. 20024 Ballrooms C & D 7:30 - 8:30 am Committee Meeting Registration

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Meeting Agenda Thursday, December 11, 2008 Marriott Crystal City at Reagan National Airport 1999 Jefferson Davis Highway Arlington, Virginia Potomac Salon D-E (All times are EST) 8:30 - 9:00 am Committee Meeting Registration 9:00 - 9:15 am Welcome and Opening Comments Kevin Kolevar, Assistant Secretary for Electricity Delivery and Energy Reliability Linda Stuntz, Chair, Electricity Advisory Committee 9:15 - 10:45 am Discussion and Approval of Energy Storage Technologies Report 10:45 - 11:00 am Break 11:00 am - 12:00 pm Discussion and Approval of Smart Grid Report 12:00 - 12:30 pm Lunch 12:30 - 1:30 pm Discussion and Approval of Recommendations in the Electricity Supply Adequacy Draft Report 1:30 - 3:30 pm Discussion of Year Two Work Plan

242

Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 10, 2011 March 10, 2011 8:30 am - 4:30 pm EST 7:30 - 8:30 am Continental Breakfast and Networking (EAC members only) 8:30 - 8:45 am WELCOME and Introductions Patricia Hoffman, Assistant Secretary for Electricity Delivery and Energy Reliability, U.S. Department of Energy Richard Cowart, Electricity Advisory Committee Chair 8:45 - 9:45 am ENERGY STORAGE TECHNOLOGIES SUBCOMMITTEE Ralph Masiello, Subcommittee Chair 9:45 - 10:45 am SMART GRID SUBCOMMITTEE Fred Butler, Subcommittee Chair Joe Paladino, Senior Advisor, Office of Electricity Delivery and Energy Reliability, U.S. Department of Energy 10:45 - 11:10 am Break 11:10 - 12:00 pm ENVIRONMENTAL REGULATIONS & RELIABILITY WORKING GROUP

243

Atmospheric Release Advisory Capability  

SciTech Connect

The Atmospheric Release Advisory Capability (ARAC) project is a Department of Energy (DOE) sponsored real-time emergency response service available for use by both federal and state agencies in case of a potential or actual atmospheric release of nuclear material. The project, initiated in 1972, is currently evolving from the research and development phase to full operation. Plans are underway to expand the existing capability to continuous operation by 1984 and to establish a National ARAC Center (NARAC) by 1988. This report describes the ARAC system, its utilization during the past two years, and plans for its expansion during the next five to six years. An integral part of this expansion is due to a very important and crucial effort sponsored by the Defense Nuclear Agency to extend the ARAC service to approximately 45 Department of Defense (DOD) sites throughout the continental US over the next three years.

Dickerson, M.H.; Gudiksen, P.H.; Sullivan, T.J.

1983-02-01T23:59:59.000Z

244

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Secure Gateway Unspecified Vulnerability 6: Citrix Secure Gateway Unspecified Vulnerability T-566: Citrix Secure Gateway Unspecified Vulnerability February 28, 2011 - 11:22pm Addthis PROBLEM: Citrix Secure Gateway Unspecified Vulnerability. PLATFORM: Citrix Secure Gateway version 3.1.4 ABSTRACT: A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia Advisory SA43497 Citrix Support IMPACT ASSESSMENT: High Discussion: This vulnerability only affects Secure Gateway version 3.1.4. Secure Gateway version 3.2.0 is not affected by this vulnerability, but Citrix recommends that customers currently using this version upgrade their deployments to version 3.2.1 in line with the guidance provided in

245

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

246

Climate Change Advisory Ltd | Open Energy Information  

Open Energy Info (EERE)

Climate Change Advisory Ltd Climate Change Advisory Ltd Jump to: navigation, search Name Climate Change Advisory Ltd Place London, United Kingdom Zip W1K 3HP Sector Renewable Energy, Services Product CCA provides advisory services in relation to corporate and project finance to companies seeking to develop renewable energy projects and technologies. References Climate Change Advisory Ltd[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Climate Change Advisory Ltd is a company located in London, United Kingdom . References ↑ "Climate Change Advisory Ltd" Retrieved from "http://en.openei.org/w/index.php?title=Climate_Change_Advisory_Ltd&oldid=343703" Categories: Clean Energy Organizations

247

Empowering Advisory Board Members: Building Partnerships AAAbbbssstttrrraaacccttt  

E-Print Network (OSTI)

Empowering Advisory Board Members: Building Partnerships AAAbbbssstttrrraaacccttt BBuuiillddiinngg council members are often asked to assist in building partnerships and communicating with policymakers for communication at each political level. #12;Empowering Advisory Board Members: Building Partnerships 1

Hayes, Jane E.

248

Lawrence Berkeley National Laboratory Advisory Board  

NLE Websites -- All DOE Office Websites (Extended Search)

Article Former Intel CEO Craig Barrett to Chair Berkeley Lab Advisory Board October 2011 At its semi-annual meeting earlier this month, the Berkeley Lab Advisory Board said...

249

Electricity Advisory Committee (EAC) - 2010 Meeting | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10 Meeting Electricity Advisory Committee (EAC) - 2010 Meeting OCTOBER 29, 2010 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE Date: Friday, October 29, 2010 8:00 a.m. - 3:00 p.m....

250

Electricity Advisory Committee (EAC) - 2012 Meetings | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Meetings Electricity Advisory Committee (EAC) - 2012 Meetings MARCH 5 & 6, 2012 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE Date: Monday, March 5, 2012 2:00 p.m. - 5:00 p.m....

251

Electricity Advisory Committee (EAC) - 2008 Meetings | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08 Meetings Electricity Advisory Committee (EAC) - 2008 Meetings DECEMBER 11, 2008 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE Date: Thursday, December 11, 2008, 9:00 a.m. - 4:00...

252

Electricity Advisory Committee (EAC) - 2011 Meetings | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Meetings Electricity Advisory Committee (EAC) - 2011 Meetings OCTOBER 19 & 20, 2011 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE Date: Wednesday, October 19, 2011 2:00 p.m. -...

253

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

254

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

255

National Construction Safety Team (NCST) Advisory ...  

Science Conference Proceedings (OSTI)

... Background on the National Construction Safety Team Act NCST Advisory Committee. ... National Construction Safety Teams Annual Reports. ...

2013-09-26T23:59:59.000Z

256

Electricity Advisory Committee Meeting Presentations October...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 - Interconnection-Wide Transmission Planning Processes Electricity Advisory Committee Meeting Presentations October 2011 - Interconnection-Wide Transmission Planning Processes...

257

Diagnostic and Advisory Systems - Nuclear Engineering Division...  

NLE Websites -- All DOE Office Websites (Extended Search)

Diagnostic and Advisory Systems Capabilities Nuclear Systems Technologies Nuclear Criticality Safety Research Reactor Analysis Decontamination and Decommissioning SystemsProcess...

258

Text Analysis Conference (TAC) Advisory Committee  

Science Conference Proceedings (OSTI)

... advisory committee consisting of representatives from government, industry, and academia. ... Hoa Trang Dang, NIST (chair) John Conroy, IDA/CCS ...

259

Electricity Advisory Committee Meeting Presentations October...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interconnection-Wide Transmission Planning Processes Electricity Advisory Committee Meeting Presentations October 2011 - Interconnection-Wide Transmission Planning Processes Panel...

260

V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Apache XML Security XPointer Expressions Processing Buffer 8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June 28, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache XML Security PLATFORM: vulnerability is reported in versions prior to 1.7.2 ABSTRACT: The vulnerability addresses the possibility of a heap overflow condition REFERENCE LINKS: Secunia Advisory SA53959 Apache Advisory CVE-2013-2210 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error within the XML Signature Reference processing code and can be exploited to cause a heap-based buffer overflow via a specially crafted document containing malformed XPointer expressions. IMPACT: Successful exploitation may allow execution of arbitrary code

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

262

V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache Struts "ParameterInterceptor" Security Bypass 2: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability May 23, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache Struts PLATFORM: The vulnerability is reported in versions prior to 2.3.14.1 ABSTRACT: A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA53495 Apache Struts Advisory S2-012 Apache Struts Advisory S2-013 CVE-2013-1965 CVE-2013-1966 IMPACT ASSESSMENT: High DISCUSSION: A request that included a specially crafted request parameter could be used to inject arbitrary OGNL code into the stack, afterward used as request

263

MEDIA ADVISORY: Secretary Chu to Lead Delegation to IAEA General Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MEDIA ADVISORY: Secretary Chu to Lead Delegation to IAEA General MEDIA ADVISORY: Secretary Chu to Lead Delegation to IAEA General Conference in Vienna, CSLF Ministerial in Beijing MEDIA ADVISORY: Secretary Chu to Lead Delegation to IAEA General Conference in Vienna, CSLF Ministerial in Beijing September 17, 2011 - 2:31pm Addthis Washington D.C. - Beginning Sunday, September 18, U.S. Energy Secretary Steven Chu will lead the American delegation at the International Atomic Energy Agency's 55th General Conference in Vienna, Austria. During his visit, Secretary Chu will deliver a speech outlining U.S. priorities regarding the peaceful use of nuclear energy; strengthening nonproliferation and international safeguards; advancing disarmament; and securing nuclear material abroad. On Thursday, September 22, Secretary Chu will join with other global

264

DRAFT "Energy Advisory Committee" - Energy Storage Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DRAFT "Energy Advisory Committee" - Energy Storage DRAFT "Energy Advisory Committee" - Energy Storage Subcommittee Report: Revision 2 DRAFT "Energy Advisory Committee" - Energy Storage Subcommittee Report: Revision 2 Energy storage plays a vital role in all forms of business and affects the daily life of virtually every citizen in the US. The rapid advancement of communications and information processing technologies are a good example of an industry built on small amounts of energy storage in hand-held devices being the critical platform for reliable performance of a major sector of everyday life. Now the same information and communications technologies will be the primary drivers in transforming the US electrical grid into a more reliable, more secure and more efficient network capable

265

90-day Second Report on Shale Gas Production - Secretary of Energy Advisory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

90-day Second Report on Shale Gas Production - Secretary of Energy 90-day Second Report on Shale Gas Production - Secretary of Energy Advisory Board 90-day Second Report on Shale Gas Production - Secretary of Energy Advisory Board Novemeber 18, 2011 The Shale Gas Subcommittee of the Secretary of Energy Advisory Board is charged with identifying measures that can be taken to reduce the environmental impact and to help assure the safety of shale gas production. Shale gas has become an important part of the nation's energy mix. It has grown rapidly from almost nothing at the beginning of the century to near 30 percent of natural gas production. Americans deserve assurance that the full economic, environmental and energy security benefits of shale gas development will be realized without sacrificing public health, environmental protection and safety. On August 18, 2011 the Subcommittee

266

Appendix B to the Minutes for the Nuclear Energy Research Advisory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appendix B to the Minutes for the Nuclear Energy Research Advisory Appendix B to the Minutes for the Nuclear Energy Research Advisory Subcommittee Meeting Appendix B to the Minutes for the Nuclear Energy Research Advisory Subcommittee Meeting Please include these additional remarks in your transmittal of the subject report to DOE's Office of Nuclear Energy, Science and Technology. Perhaps the greatest security threat to the United States today, and of paramount concern to American citizens since September 11, 2001, is that nuclear weapon-usable materials will be stolen, seized, or secretly diverted from nuclear facilities and then used by terrorists to develop and deliver a crude nuclear explosive device, or by a hostile proliferant state to develop more sophisticated nuclear weapons. This is not the time for the United States to be launching an international research effort to develop

267

Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Minutes of the Secretary of Energy Advisory Board Public Minutes of the Secretary of Energy Advisory Board Public Meeting on October 12, 2011 Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on October 12, 2011 SEAB members heard opening remarks from Chairman Perry and Secretary Chu. Secretary Chu gave a presentation on DOE in the innovation chain. Following Secretary Chu's opening session was a "Director's Perspective" from George Miller, LLNL Director. Dr. Miller's presentation was followed by presentations from LLNL on the National Ignition Facility (NIF), cyber security, and computational advances in applied energy. Following the lab presentations, the Board heard updates from the Natural Gas Subcommittee and the Building Efficiency Subcommittee. The last session of the meeting

268

Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Minutes of the Secretary of Energy Advisory Board Public Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on October 12, 2011 Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on October 12, 2011 SEAB members heard opening remarks from Chairman Perry and Secretary Chu. Secretary Chu gave a presentation on DOE in the innovation chain. Following Secretary Chu's opening session was a "Director's Perspective" from George Miller, LLNL Director. Dr. Miller's presentation was followed by presentations from LLNL on the National Ignition Facility (NIF), cyber security, and computational advances in applied energy. Following the lab presentations, the Board heard updates from the Natural Gas Subcommittee and the Building Efficiency Subcommittee. The last session of the meeting

269

Ultra-Deepwater Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ultra-Deepwater Advisory Committee Ultra-Deepwater Advisory Committee Minutes of Meeting of June 21, 2007 Crystal City Marriott, Arlington, VA Executive Session Bill Hochheiser, the Committee Management Officer (CMO), welcomed the Ultra- Deepwater Advisory Committee (hereafter referred to as the Committee) at 8:35 a.m. on June 21, 2007. Bill noted that he shared the CMO responsibilities with Elena Melchert but, although she was not able to attend the meeting, she sent her regards to the Committee members. The Agenda for the meeting and Committee Member Sign-in sheet are provided as Appendix 1 and Appendix 2, respectively. After appointment and administration of Oath of Office for special Government employees, the Committee was briefed on conflict of interest statutes and the

270

Advisory Committees | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Committees Committees Advisory Committees Pictured above is the award-winning Flow Rate Technical Group/Nodal Analysis Team whose advisory services provided a swift and effective response to the Deepwater Horizon oil spill. The team put forth a multi-agency effort critical to estimating the rate of oil flowing into the Gulf and, in turn, to developing options to cap the well. Pictured above is the award-winning Flow Rate Technical Group/Nodal Analysis Team whose advisory services provided a swift and effective response to the Deepwater Horizon oil spill. The team put forth a multi-agency effort critical to estimating the rate of oil flowing into the Gulf and, in turn, to developing options to cap the well. The Office of Fossil Energy actively manages and/or oversees several

271

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

272

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

273

The Federal Advisory Committee Act of 1972  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory Committee Act of 1972 Advisory Committee Act of 1972 The Federal Advisory Committee Act (FACA) of 1972 (Public Law 92-463) was enacted by Congress to formally recognize the merits of seeking the advice and assistance of our nation's citizens. Congress sought to assure that advisory committees would provide advice that is relevant, objective, and open to the public. In addition, Congress sought that advisory committees would act promptly to complete their work and comply with reasonable cost controls and recordkeeping requirements. Frequently Asked Questions What is a Federal Advisory Committee? An advisory committee is any committee, board, commission, council, conference, panel, task force, or other similar group which is -- established by statute or reorganization plan; established

274

Correlated Failures of Power Systems: Analysis of the Nordic Grid  

E-Print Network (OSTI)

. Cohen, "The Smarter Grid," IEEE Security and Privacy, vol. 8, 2010. [7] "Securing the SmartGrid," Cisco

275

T-537: Oracle Critical Patch Update Advisory - January 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:11am 7:11am Addthis PROBLEM: Oracle Critical Patch Update Advisory - January 2011. PLATFORM: Oracle Database, Oracle Fusion Middleware, Oracle Enterprise Manager Grid Control, Oracle E-Business Suite Applications, JD Edwards EnterpriseOne, JD Edwards OneWorld Tools, PeopleSoft Enterprise Portal Applications, PeopleSoft Enterprise PeopleTools, Siebel Enterprise, Oracle Industry Applications and Oracle VM patches. ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required because of interdependencies by those security patches. Critical Patch Updates are cumulative. reference LINKS: Oracle Critical Patch SecurityTracker Alert ID: 1024979 CVE-2010-3594 Oracle Appendix Critical Patch Updates and Security Alerts

276

T-537: Oracle Critical Patch Update Advisory - January 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2:30pm 2:30pm Addthis PROBLEM: Oracle Critical Patch Update Advisory - January 2011. PLATFORM: Oracle Database, Oracle Fusion Middleware, Oracle Enterprise Manager Grid Control, Oracle E-Business Suite Applications, JD Edwards EnterpriseOne, JD Edwards OneWorld Tools, PeopleSoft Enterprise Portal Applications, PeopleSoft Enterprise PeopleTools, Siebel Enterprise, Oracle Industry Applications and Oracle VM patches. ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required because of interdependencies by those security patches. Critical Patch Updates are cumulative. reference LINKS: Oracle Critical Patch SecurityTracker Alert ID: 1024979 CVE-2010-3594 Oracle Appendix Critical Patch Updates and Security Alerts

277

DOE Solar Decathlon: Cisco  

NLE Websites -- All DOE Office Websites (Extended Search)

same critical goals and missions with fewer resources. As agency officials look to adopt new and innovative solutions to transform their organizations, many are working to...

278

RFI Comments - Cisco  

Science Conference Proceedings (OSTI)

... Our business resiliency program includes incident management ... interoperability, scalability, stability and resilience. ... missions and business functions ...

2013-04-09T23:59:59.000Z

279

Cisco Systems Inc.  

E-Print Network (OSTI)

draft-ietf-eman-applicability-statement-03 The objective of Energy Management (EMAN) is to provide an energy management framework for networked devices. This document presents the applicability of the EMAN framework to a variety of scenarios. This document lists use cases and target devices that can potentially implement the EMAN framework and associated SNMP MIB modules. These use cases are useful for identifying requirements for the framework and MIBs. Further, we describe the relationship of the EMAN framework to relevant other energy monitoring standards and architectures. Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at

Mouli Chandramouli; Bruce Nordman

2013-01-01T23:59:59.000Z

280

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Yale University HEALTH & SAFETY ADVISORY  

E-Print Network (OSTI)

and Renovation Electric ­ Temporary Elevated Work - Fall Protection Excavation Concrete Masonry Scaffolding Steel Yale's long-term goal to experience average loss time frequency rates below 1.0 and average OSHA recordable incident rates below 2.5 on all projects. This Advisory provides Contractors with safety

Cooley, Lynn

282

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

283

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

284

DOE Hydrogen and Fuel Cells Program: Advisory Panels  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts Background Budget Timeline Program Activities Advisory Panels Hydrogen and Fuel Cell Technical Advisory Committee National Research Council External Coordination U.S....

285

DOE Announces Membership of New Electricity Advisory Committee...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the new Electricity Advisory Committee. DOE anounced the members of its newly-established Electricity Advisory Committee. Thirty innaugural members will serve one or two year terms...

286

Electricity Advisory Committee Meeting, May 20, 2008 (TRANSCRIPT...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 20, 2008 (TRANSCRIPT) Electricity Advisory Committee Meeting, May 20, 2008 (TRANSCRIPT) Transcript of the May 20, 2008 Electricity Advisory Committee Meeting including a FERC...

287

Electricity Advisory Committee Meeting, December 11, 2008: Meeting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 11, 2008: Meeting transcript Electricity Advisory Committee Meeting, December 11, 2008: Meeting transcript Transcript of the Electricity Advisory Committee Meeting held on...

288

Electricity Advisory Committee Meeting, October 29, 2010: Minutes...  

NLE Websites -- All DOE Office Websites (Extended Search)

Meeting, October 29, 2010: Minutes Electricity Advisory Committee Meeting, October 29, 2010: Minutes Minutes of the Electricity Advisory Committee Meeting held on October 29, 2010,...

289

Electricity Advisory Committee Meeting, May 20, 2008: Minutes...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 20, 2008: Minutes Electricity Advisory Committee Meeting, May 20, 2008: Minutes Minutes of the Electricity Advisory Committee Meeting held on May 20, 2008, including...

290

Electricity Advisory Committee Meeting, September 26, 2008: Minutes...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Meeting, September 26, 2008: Minutes Electricity Advisory Committee Meeting, September 26, 2008: Minutes Minutes of the Electricity Advisory Committee Meeting held on September 26,...

291

Electricity Advisory Committee Meeting, September 25, 2008: Transcript...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 25, 2008: Transcript Electricity Advisory Committee Meeting, September 25, 2008: Transcript Transcript of the Electricity Advisory Committee Meeting 3:30 p.m. through...

292

Electricity Advisory Committee Meeting Agenda, September 25-September...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting Agenda, September 25-September 26, 2008 Electricity Advisory Committee Meeting Agenda, September 25-September 26, 2008 Agenda of the...

293

Electricity Advisory Committee Meeting, October 29, 2010: Transcript...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 29, 2010: Transcript Electricity Advisory Committee Meeting, October 29, 2010: Transcript Transcript of the Electricity Advisory Committee Meeting held on October 29, 2010....

294

About Fermilab | Fermilab and the Community | Community Advisory...  

NLE Websites -- All DOE Office Websites (Extended Search)

Advisory Board Meeting Materials Community Advisory Board members Community Task Force Video March 28, 2013 - Meeting Video January 24, 2013 - Meeting Video November 29, 2012 -...

295

DOE Terminated Federal Advisory Committees | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

& Publications FederalAdvisoryCommitteeManagementProgramNov182008.pdf 90-day Second Report on Shale Gas Production - Secretary of Energy Advisory Board SEAB Charter 2012...

296

Summary Minutes of the Secretary of Energy Advisory Board Public...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on November 14, 2011 Summary Minutes of the Secretary of Energy Advisory Board Public Meeting on November...

297

Secretary of Energy Advisory Board Hosts Conference Call on Shale...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here Home Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas Draft Report Secretary of Energy Advisory Board Hosts Conference Call on Shale Gas...

298

Secretary of Energy Advisory Board Subcommittee Releases Shale...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agencies You are here Home Secretary of Energy Advisory Board Subcommittee Releases Shale Gas Recommendations Secretary of Energy Advisory Board Subcommittee Releases Shale Gas...

299

October 15 & 16, 2012 Meeting of the Electricity Advisory Committee...  

NLE Websites -- All DOE Office Websites (Extended Search)

October 15 & 16, 2012 Meeting of the Electricity Advisory Committee October 15 & 16, 2012 Meeting of the Electricity Advisory Committee October 15 & 16, 2012 Meeting of the...

300

Remarks to the Electricity Advisory Committee May 20, 2008 |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Remarks to the Electricity Advisory Committee May 20, 2008 Remarks to the Electricity Advisory Committee May 20, 2008 Remarks made at the inaugural meeting of the Electricity...

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Electricity Advisory Committee Notice of Open Meeting March 6...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Notice of Open Meeting March 6 and 7, 2013: Federal Register Notice Volume 78, No. 26 - Feb. 7, 2013 Electricity Advisory Committee Notice of Open...

302

USDA and DOE Biomass Research And Development Technical Advisory...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Biomass Research And Development Technical Advisory Committee Members USDA and DOE Biomass Research And Development Technical Advisory Committee Members January 15, 2008 - 10:23am...

303

Electricity Advisory Committee (EAC) 2012-2013 Membership Roster...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-2013 Membership Roster: August 3, 2012 Electricity Advisory Committee (EAC) 2012-2013 Membership Roster: August 3, 2012 2012-2013 Membership roster for the Electricity Advisory...

304

Nuclear Energy Research Advisory Committee (NERAC) Meeting of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Meeting of November 3 and 4, 2003 Nuclear Energy Research Advisory Committee (NERAC) Meeting of November 3 and 4, 2003 The agenda for the National Energy Research Advisory...

305

Nuclear Energy Research Advisory Committee (NERAC) agenda 11...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

agenda 11303 Nuclear Energy Research Advisory Committee (NERAC) agenda 11303 This is an agenda of the 110303 and 110403 Nuclear Energy Research Advisory Committee (NERAC)...

306

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

307

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

308

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

309

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

310

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

311

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

312

Unconventional Resources Technology Advisory Committee | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Unconventional Resources Unconventional Resources Technology Advisory Committee Unconventional Resources Technology Advisory Committee The Unconventional Resources Technology Advisory Committee advises DOE on its research in unconventional oil and natural gas resources, such as shale gas. The Unconventional Resources Technology Advisory Committee advises DOE on its research in unconventional oil and natural gas resources, such as shale gas. Mission The Secretary of Energy, in response to provisions of Subtitle J, Sec. 999 of the Energy Policy Act of 2005, must carry out a program of research, development, demonstration, and commercial application of technologies for ultra-deepwater and onshore unconventional natural gas and other petroleum resource exploration and production, as well as addressing the technology

313

ENVIRONMENTAL MANAGEMENT SITE-SPECIFIC ADVISORY BOARD  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Washington, D.C. 20585 Washington, D.C. 20585 April 25, 2013 2 Environmental Management Site-Specific Advisory Board - April 25, 2013 Meeting Minutes LIST OF ACRONYMS AB - Advisory Board ANL - Argonne National Laboratory ARP - Accelerator Retrieval Project BNL - Brookhaven National Laboratory BRC - Blue Ribbon Commission CAB - Citizens Advisory Board D&D - Decontamination & Decommissioning DDFO - Deputy Designated Federal Officer DOE - Department of Energy DUF6 - Depleted Uranium Hexafluoride DWPF - Defense Waste Processing Facility EIS - Environmental Impact Statement EM - DOE Office of Environmental Management EM SSAB - DOE Office of Environmental Management Site-Specific Advisory Board EPA - U.S. Environmental Protection Agency FY - Fiscal Year

314

Community Advisory Council, Brookhaven National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

The Community Advisory Council Council Members > Don Garber Affiliated Brookhaven Civic Organizations Margaret Malloy American Physical Society Arnie Peskin Brookhaven Retired...

315

Electricity Advisory Committee - Reports and Memos | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports and Memos Electricity Advisory Committee - Reports and Memos DOE Response to 2013 EAC Work Products, September 2013 Recommendations on Interconnection-Wide Planning, June...

316

Electricity Advisory Committee Meeting Presentations October...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 2012 - Tuesday, October 16, 2012 Electricity Advisory Committee Meeting Presentations October 2012 - Tuesday, October 16, 2012 The Department of Energy's Electricity...

317

Electricity Advisory Committee Meeting Presentations October...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 - Microgrids Electricity Advisory Committee Meeting Presentations October 2011 - Microgrids Panel Discussion on Microgrids SGD&E's Microgrid Activities - Tom Bialek, Chief...

318

DRAFT "Energy Advisory Committee" - Energy Storage Subcommittee...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report: Revision 2 DRAFT "Energy Advisory Committee" - Energy Storage Subcommittee Report: Revision 2 Energy storage plays a vital role in all forms of business and affects the...

319

National Construction Safety Team Advisory Committee 2003 ...  

Science Conference Proceedings (OSTI)

... of NIST, to the Secretary of Commerce, to ... and Director, Center for Energy Research University ... Construction Safety Team Advisory Committee 2003 ...

2012-11-01T23:59:59.000Z

320

Methane Hydrate Advisory Committee Meeting Minutes | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Gas Regulation Advisory Committees Science & Innovation Clean Coal Carbon Capture and Storage Oil & Gas Mission News & Blog About Us Offices All Offices Program Offices Staff...

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Electricity Advisory Committee Notice of Open Teleconference...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 24 2014: Federal Register Notice Volume 78, No. 246 - December 23, 2013 Electricity Advisory Committee Notice of Open Teleconference January 24 2014: Federal Register...

322

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

323

The IAEA Assistance and Training Programme for Transport Security  

Science Conference Proceedings (OSTI)

The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

2010-01-01T23:59:59.000Z

324

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

325

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

326

T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat May Ignore @ServletSecurity Annotation 0: Apache Tomcat May Ignore @ServletSecurity Annotation Protections T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections March 16, 2011 - 3:05pm Addthis PROBLEM: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by an error related to ignoring @ServletSecurity annotations. An attacker could exploit this vulnerability to bypass security restrictions and launch further attacks on the system. PLATFORM: Apache Tomcat versions 7.0.0 through 7.0.10. ABSTRACT: Apache Tomcat May Ignore @ServletSecurity Annotation Protections. A remote user may be able to bypass @ServletSecurity annotation protections. reference LINKS: Apache Tomcat Advisory: Apache Tomcat 7.0.11 CVE-2011-1088 Security Tracker Alert ID:1025215 OSVDB ID: 71027

327

V-216: Drupal Monster Menus Module Security Bypass and Script Insertion  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

216: Drupal Monster Menus Module Security Bypass and Script 216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August 12, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in the Monster Menus module for Drupal PLATFORM: Drupal Monster Menus Module 6.x and 7.x ABSTRACT: The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks. REFERENCE LINKS: Secunia Advisory SA54391 Drupal Security Advisory CVE-2013-4229 CVE-2013-4230 IMPACT ASSES SMENT: Medium DISCUSSION: 1) Input passed via the title when editing page settings is not properly sanitised before being edited the next time. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's

328

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: MySQL User Login Security Bypass and Unspecified 8: MySQL User Login Security Bypass and Unspecified Vulnerability U-188: MySQL User Login Security Bypass and Unspecified Vulnerability June 12, 2012 - 7:00am Addthis PROBLEM: A security issue and vulnerability have been reported in MySQL PLATFORM: MySQL 5.x ABSTRACT: An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. Reference LINKS: Original Advisory CVE-2012-2122 Secunia Advisory 49409 IMPACT ASSESSMENT: High Discussion: Successful exploitation of this vulnerability requires MySQL to be built on a system with a library that allows "memcmp()" to return a value outside of the -128 through 127 range (e.g. sse-optimized glibc). NOTE: Vendor binaries are reportedly not affected. The security issue is reported in versions prior to 5.1.63 and 5.5.25.

329

Argonne CNM: Science Advisory Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

CNM Scientific Advisory Committee CNM Scientific Advisory Committee Donald W. Brenner Kobe Distinguished Professor Associate Department Head North Carolina State University Materials Science and Engineering 911 Partners Way Engineering Building I, Room 3002 Raleigh, NC 27606 brenner@ncsu.edu Franz Himpsel Professor Department of Physics 5108 Chamberlin Hall University of Wisconsin-Madison 1150 University Avenue Madison, WI 53706-1390 fhimpsel@facstaff.wisc.edu Vanita Mani Technology Leader Energy Storage & Conversion Materials GE Global Research 1 Research Circle Niskayuna, NY 12309 maniva@ge.com Peter Mardilovich Hewlett-Packard Company 1000 NE Circle Blvd. Corvallis, OR 97330-4239 peter.mardilovich@hp.com Christopher B. Murray Department of Chemistry University of Pennsylvania 347N (Chem 73) & 322 (LRSM) SME

330

Unconventional Resources Technology Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory Committee (URTAC) Meeting Crowne Plaza Hotel, Houston, Texas July 25, 2007 Welcome Sally Zinke, Chair of the Unconventional Resources Technology Advisory Committee (Committee), convened the meeting at 8:30 a.m. on July 25 in Houston, Texas. She introduced Bill Hochheiser, the Committee Management Officer, who presented a "Safety Moment" focusing on the emergency procedures for exiting the conference room and reminding people of the importance of wearing seat belts. Appendix 1 contains the Committee sign-in sheet for the meeting. Jim Mosher's resignation from the Committee due to his recent appointment to the Department of Interior was announced. For the record, his resignation letter is included in these minutes as Appendix 2.

331

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

332

Nonproliferation and National Security - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and Nonproliferation and National Security CAPABILITIES Overview Nuclear Systems Modeling and Design Analysis Nuclear Systems Technologies Risk and Safety Assessments Nonproliferation and National Security Materials Testing Engineering Computation & Design Engineering Experimentation Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Capabilities Nonproliferation and National Security Bookmark and Share Nuclear Export Controls Nuclear Exports Controls We provide technical advisory services to DOE in the implementation of U.S. nonproliferation policy. This includes assessments of proliferation risks presented by emerging technologies and

333

Appliance Standards and Rulemaking Federal Advisory Committee Charter  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

APPLIANCE STANDARDS AND RULEMAKING APPLIANCE STANDARDS AND RULEMAKING FEDERAL ADVISORY COMMITTEE (ASRAC) U.S. DEPARTMENT OF ENERGY Federal Advisory Committee Charter 1. Committee's Official Designation: Appliance Standards and Rulemaking Federal Advisory Committee (ASRAC) 2. Authority: This charter establishes the Appliance Standards and Rulemaking Federal Advisory Committee under the authority of the Department of Energy (DOE). The Committee is being amended

334

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

335

DOE Manual - ADVISORY COMMITTEE MANAGEMENT PROGRAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM SSAB » DOE Manual - EM SSAB » DOE Manual - ADVISORY COMMITTEE MANAGEMENT PROGRAM DOE Manual - ADVISORY COMMITTEE MANAGEMENT PROGRAM This Manual supplements the Federal Advisory Committee Act (FACA), Title 5 United States Code (U.S.C.), Appendix 2, as amended, and the General Services Administration's (GSA's) final rule "Federal Advisory Committee Management" Title 41 Code of Federal Regulations (CFR), Part 102-3, which establishes the policies and minimum requirements for Federal agencies to manage and administer advisory committees. The Manual provides detailed Department of Energy (DOE or Department) requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. DOE Manual - Advisory Committee Management Program

336

DOE Manual - ADVISORY COMMITTEE MANAGEMENT PROGRAM | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM SSAB » DOE Manual - EM SSAB » DOE Manual - ADVISORY COMMITTEE MANAGEMENT PROGRAM DOE Manual - ADVISORY COMMITTEE MANAGEMENT PROGRAM This Manual supplements the Federal Advisory Committee Act (FACA), Title 5 United States Code (U.S.C.), Appendix 2, as amended, and the General Services Administration's (GSA's) final rule "Federal Advisory Committee Management" Title 41 Code of Federal Regulations (CFR), Part 102-3, which establishes the policies and minimum requirements for Federal agencies to manage and administer advisory committees. The Manual provides detailed Department of Energy (DOE or Department) requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. DOE Manual - Advisory Committee Management Program

337

Academic Advisory Board Activities and Perspectives  

NLE Websites -- All DOE Office Websites (Extended Search)

Advisory Board Advisory Board Activities and Perspectives Karen A. Thole, Chair Academic Advisory Board Virginia Tech, Mechanical Engineering Department Peer Review Workshop October 20, 2005 * Review of the Academic Advisory Board * Activities since 2004 Peer Review Workshop * Open discussion Discussion Topics Chair: Karen Thole, Virginia Tech Co-Chair: Tim Lieuwen, Georgia Tech Secretary: Vince McDonell, U of California-Irvine Education: Yongho Sohn, U of Central Florida Combustion: Dom Santavicca, Penn State Materials: Eric Jordan, U of Connecticut Aero / Ht Transfer: Jeffrey Bons, Brigham Young Diagnostics: Scott Sanders, U. of Wisconsin Academic Advisory Board (AAB) Contact any of us with your concerns/issues!!! Goals for the AAB * Provide guidance to the UTSR Program

338

DOE Manual - Advisory Committee Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANUAL MANUAL DOE M 515.1-1 Approved: 10-22-07 ADVISORY COMMITTEE MANAGEMENT PROGRAM U.S. DEPARTMENT OF ENERGY Office of Management AVAILABLE ONLINE AT: INITIATED BY: www.directives.doe.gov Office of Management i DOE M 515.1-1 10-22-07 ADVISORY COMMITTEE MANAGEMENT PROGRAM 1. PURPOSE. This Manual supplements the Federal Advisory Committee Act (FACA), Title 5 United States Code (U.S.C.), Appendix 2, as amended, and the General Services Administration's (GSA's) final rule "Federal Advisory Committee Management" Title 41 Code of Federal Regulations (CFR), Part 102-3, which establishes the policies and minimum requirements for Federal agencies to manage and administer advisory committees. The Manual provides detailed Department of Energy (DOE or Department)

339

Nuclear Energy Advisory Committee | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Energy Advisory Committee Nuclear Energy Advisory Committee Nuclear Energy Advisory Committee The Nuclear Energy Advisory Committee (NEAC), formerly the Nuclear Energy Research Advisory Committee (NERAC), was established on October 1, 1998, to provide independent advice to the Office of Nuclear Energy (NE) on complex science and technical issues that arise in the planning, managing, and implementation of DOE's nuclear energy program. NEAC periodically reviews the elements of the NE program and based on these reviews provides advice and recommendations on the program's long-range plans, priorities, and strategies to effectively address the scientific and engineering aspects of the research and development efforts. In addition, the committee provides advice on national policy and scientific aspects of

340

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

342

V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2013 1: Oracle Java SE Critical Patch Update Advisory - June 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 June 19, 2013 - 1:06am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2013 PLATFORM: Version(s): 5.0 Update 45, 6 Update 45, 7 Update 21; and prior versions ABSTRACT: Multiple vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Oracle Java SE Critical Patch Update June 2013 SecurityTracker Alert ID: 1028679 CVE-2013-1500, CVE-2013-1571 CVE-2013-2400, CVE-2013-2407 CVE-2013-2412, CVE-2013-2437 CVE-2013-2442, CVE-2013-2443 CVE-2013-2444, CVE-2013-2445 CVE-2013-2446, CVE-2013-2447 CVE-2013-2448, CVE-2013-2449 CVE-2013-2450, CVE-2013-2451 CVE-2013-2452, CVE-2013-2453 CVE-2013-2454, CVE-2013-2455 CVE-2013-2456, CVE-2013-2457

343

Homeland Security | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

344

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

345

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

346

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

347

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

348

U-070:Redhat krb5 Critical Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70:Redhat krb5 Critical Security Update 70:Redhat krb5 Critical Security Update U-070:Redhat krb5 Critical Security Update December 28, 2011 - 8:30am Addthis PROBLEM: redhat krb5 Critical Security Update PLATFORM: RHEL Desktop Workstation (v. 5 client) Red Hat Desktop (v. 4) Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux Desktop (v. 5 client) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) ABSTRACT: Vulnerability can be exploited by malicious people to compromise a vulnerable system. REFERENCE LINKS: RHSA-2011:1851-2 MITKRB5-SA-2011-008 Secunia Advisory: SA47357 Secunia Advisory: SA47359 RH Bugzilla: 770325 CVE-2011-4862 JC3-CIRC Tech Bulletin U-069 IMPACT ASSESSMENT: High Discussion: krb5 telnet daemon is not enabled by default in any version of Red Hat

349

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

350

Environmental Management Advisory Board Subcommittees | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EMAB » Environmental EMAB » Environmental Management Advisory Board Subcommittees Environmental Management Advisory Board Subcommittees ACQUISITION AND PROJECT MANAGEMENT SUBCOMMITTEE SUBCOMMITTEE PURPOSE: The Subcommittee will provide advice, information, and recommendations to the Assistant Secretary for Environmental Management (EM) relating to project management. Although, EM has a solid performance record for cleanup projects, EM must improve its ability to deliver all projects within cost and on schedule, thereby reducing EM's operations and maintenance costs. The Subcommittee produces reports and recommendations to the Environmental Management Advisory Board (EMAB) as necessary. Mr. David W. Swindle, Jr. (Co-Chair) Federal Services/URS Corporation Mr. G. Brian Estes (Co-Chair)

351

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

352

Electricity Advisory Committee - Federal Register Notices | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Register Notices Federal Register Notices Electricity Advisory Committee - Federal Register Notices Electricity Advisory Committee - Federal Register Notices NOTICE OF OPEN ELECTRICITY ADVISORY COMMITTEE MEETING May 21, 2012 (Volume 77, Number 98) This notice announces the open meeting of the DOE Electricity Advisory Committee. Date: June 11 and 12, 2012. NOTICE OF OPEN ELECTRICITY ADVISORY COMMITTEE MEETING February 22, 2012 (Volume 77, Number 35) This notice announces the open meeting of the DOE Electricity Advisory Committee. Date: March 5 and 6, 2012. NOTICE OF OPEN ELECTRICITY ADVISORY COMMITTEE MEETING September 27, 2011 (Volume 76, Number 187) This notice announces the open meeting of the DOE Electricity Advisory Committee. Date: October 19 and 20, 2011. NOTICE OF OPEN ELECTRICITY ADVISORY COMMITTEE MEETING

353

EM Highlights Advisory Board Contributions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Highlights Advisory Board Contributions Highlights Advisory Board Contributions EM Highlights Advisory Board Contributions March 5, 2013 - 12:00pm Addthis Participants in the session on Advisory Board contributions to the EM program included, left to right, Karen Guevara, Savannah River Site; Ralph Phelps, Northern New Mexico Citizens’ Advisory Board; Cate Alexander, EM; Eric Roberts, EHI Consultants; Dave Adler, Oak Ridge site; and Ralph Young, Paducah Citizens Advisory Board. Participants in the session on Advisory Board contributions to the EM program included, left to right, Karen Guevara, Savannah River Site; Ralph Phelps, Northern New Mexico Citizens' Advisory Board; Cate Alexander, EM; Eric Roberts, EHI Consultants; Dave Adler, Oak Ridge site; and Ralph Young, Paducah Citizens Advisory Board.

354

EM Highlights Advisory Board Contributions | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM Highlights Advisory Board Contributions EM Highlights Advisory Board Contributions EM Highlights Advisory Board Contributions March 5, 2013 - 12:00pm Addthis Participants in the session on Advisory Board contributions to the EM program included, left to right, Karen Guevara, Savannah River Site; Ralph Phelps, Northern New Mexico Citizens’ Advisory Board; Cate Alexander, EM; Eric Roberts, EHI Consultants; Dave Adler, Oak Ridge site; and Ralph Young, Paducah Citizens Advisory Board. Participants in the session on Advisory Board contributions to the EM program included, left to right, Karen Guevara, Savannah River Site; Ralph Phelps, Northern New Mexico Citizens' Advisory Board; Cate Alexander, EM; Eric Roberts, EHI Consultants; Dave Adler, Oak Ridge site; and Ralph Young, Paducah Citizens Advisory Board.

355

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

356

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

357

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

358

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

359

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

360

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

362

Electricity Advisory Committee Meeting, December 11, 2008: Meeting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Meeting, December 11, 2008: Meeting Meeting, December 11, 2008: Meeting transcript Electricity Advisory Committee Meeting, December 11, 2008: Meeting transcript Transcript of the Electricity Advisory Committee Meeting held on December 11, 2008 including a discussion and approval of the final energy storage technologies white paper, discussion and approval of the final smart grid white paper, discussion and approval of the final committee report on electricity supply adequacy, and discussion of the year two work plan. Electricity Advisory Committee Meeting, December 11, 2008: Meeting transcript More Documents & Publications Electricity Advisory Committee Meeting, May 20, 2008 (TRANSCRIPT) Electricity Advisory Committee Meeting, September 25, 2008: Transcript Electricity Advisory Committee Meeting, March 10, 2011 - Meeting Minutes

363

Environmental Management Advisory Board Charter | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Communication & Engagement » EMAB » Environmental Services » Communication & Engagement » EMAB » Environmental Management Advisory Board Charter Environmental Management Advisory Board Charter The Environmental Management Advisory Board's (EMAB)'s most recent charter outlines the objective, structure, and scope of the Board. EMAB Charter More Documents & Publications SEAB Charter 2012 Methane Hydrate Advisory Committee Charter Electricity Advisory Committee, U.S. Department of Energy: Advisory Committee Charter, August 9, 2012 Waste Management Nuclear Materials & Waste Tank Waste and Waste Processing Waste Disposition Packaging and Transportation Site & Facility Restoration Deactivation & Decommissioning (D&D) Facility Engineering Soil & Groundwater Sustainability Program Management

364

EM Site-Specific Advisory Board (EM SSAB) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site-Specific Advisory Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) EM Site-Specific Advisory Board (EM SSAB) MISSION The EM SSAB was created to involve stakeholders more directly in DOE EM cleanup decisions. When stakeholders share their opinions by becoming involved in clean-up discussions, federal decision-makers and cleanup

365

Scientific Advisory Committee | Stanford Synchrotron Radiation Lightsource  

NLE Websites -- All DOE Office Websites (Extended Search)

Scientific Advisory Committee Scientific Advisory Committee » SAC DOCUMENTS 2013 Role and Charter of the SSRL SAC Scope The SSRL Scientific Advisory Committee (SAC) reports to and advises the SSRL Director on issues related to: Operation of SSRL as a scientific user facility Planning, construction and operation of new SSRL facilities Long-term scientific directions of SSRL Membership and Officers SAC consists of 12 external members, and representatives from the following SSRL committees serve on the SAC in an Ex Officio capacity Co-Chairs of the SSRL Proposal Review Panel (PRP) Chair of the Structural Molecular Biology Advisory Committee (SMBAC) Chair of the SSRL Users' Organization Executive Committee (SSRLUOEC SAC members are appointed by the SSRL Director for 3-year terms, with one third of the members rotating off and being replaced every year

366

OpenEI Community - meetings + advisory group  

Open Energy Info (EERE)

Thoughts after the Thoughts after the Geothermal Regulatory Roadmap Advisory Meeting http://en.openei.org/community/blog/thoughts-after-geothermal-regulatory-roadmap-advisory-meeting The most recent meeting of the Advisory Group occurred on July 19th.  This was a big event for the team, as it was the first real project review meeting since we kicked off the meetings to develop flow charts.   I was really happy with the meeting outcomes.  We had a lot of constructive feedback from the group, and the consensus that the project is on a good course continues to build over time. advisory-meeting"

367

EMSL: About EMSL: Science Advisory Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

An independent Science Advisory Committee provides objective advice on An independent Science Advisory Committee provides objective advice on long-term science direction to the EMSL Director related to topics such as: EMSL's focus on national priorities and science challenges Strategy for accomplishing EMSL's vision Potential opportunities for transferring science to applications Stewardship. The Science Advisory Committee comprises distinguished scientists from academia, national laboratories, and research institutions across the United States who provide expertise in EMSL's major capability areas of biology, environmental science, molecular science, and theory. The committee reports to the Director, Pacific Northwest National Laboratory. Responsibilities and activities of the Science Advisory Committee include: Providing advice on scientific direction for the EMSL user program

368

Electricity Advisory Committee Meeting Presentations October 2012 -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting Presentations October 2012 - Electricity Advisory Committee Meeting Presentations October 2012 - Tuesday, October 16, 2012 Electricity Advisory Committee Meeting Presentations October 2012 - Tuesday, October 16, 2012 The Department of Energy's Electricity Advisory Committee held a meeting on Monday, October 15 and Tuesday, October 16 at the Capital Hilton Hotel, 16th and K Streets, NW, Washington, DC. Tuesday, October 16, 2012 Storage Subcommittee Report to DOE and Work Plan: Ralph Masiello, Chair Key Developments in the OE Smart Grid Program Joe Paladino, Smart Grid Program Manager, DOE Eric Lightner, Smart Grid Task Force Director, DOE Chris Irwin, Smart Grid Standards & Interoperability Coordinator, DOE Smart Grid Subcommittee Recommendations for Customer Acceptance: Wanda Reder, Chair

369

Methane Hydrate Advisory Committee | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Methane Hydrate Advisory Methane Hydrate Advisory Committee Methane Hydrate Advisory Committee The Methane Hydrate Advisory Committee was created in response to provisions of the Methane Hydrate Research and Development Act of 2000 and reauthorized by the Energy Policy Act of 2005. The Committee is to advise the Secretary of Energy on potential applications of methane hydrate; assist in developing recommendations and priorities for the methane hydrate research and development program; and submit to Congress one or more reports on an assessment of the research program and an assessment of the DOE 5-year research plan. The Committee's charter stipulates that up to 15 members can be appointed by the Secretary of Energy, representing institutions of higher education, industrial enterprises and oceanographic institutions and state agencies.

370

Fermilab | Directorate | Fermilab Accelerator Advisory Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

Advisory Committee Advisory Committee Meeting of the Fermilab Accelerator Advisory Committee February 6-8, 2013 Charge Agenda Closeout Report Final Report November 7 - 9, 2011 Charge Agenda Closeout Report Final Report Lia Merminga (TRIUMF), Chair Ilan Ben-Zvi (BNL) Wolfram Fischer (BNL) Steve Gourlay (LBNL) Kathy Harkay (ANL) Mark Hogan (SLAC) Andrew Hutton (JLAB) Peter Ostroumov (ANL) Jamie Rosenzweig (UCLA) Andrei Seryi (SLAC) Previous Meetings November 7-9, 2011 July 28-30, 2010 November 16-18, 2009 February 3-4, 2009 May 6-8,2008 August 8-10, 2007 December 4-6, 2006 May 10-12, 2006 May 10-12, 2005 November 17-19, 2004 May 10-12, 2004 November 19-21, 2003 February 4-6, 2003 May 13-15, 2002 Fermilab Accelerator Advisory Committee (AAC) Reports 18th Meeting – July 28-30, 2010 (Closeout) 17th Meeting - November 16-18, 2009

371

meetings + advisory group | OpenEI Community  

Open Energy Info (EERE)

group The most recent meeting of the Advisory Group occurred on July 19th. This was a big event for the team, as it was the first real project review meeting since we kicked...

372

EMSL: Science: GC: Membrane Biology - Advisory Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

Advisory Committee CHAIR - Dr. Jack Johnson, SCRIPPS Department of Molecular Biology 10550, N. Torrey Pines Road La Jolla, CA 92037 Ph. 858-784-2947 Fx. 858-784-8660...

373

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

374

NATIONAL STEM CONSORTIUM  

Science Conference Proceedings (OSTI)

... Manufacturers Assn.) Cyber: A+, Network+, and Security+ from CompTIA and CCNA from Cisco Electric Vehicle: SAE International's Vehicle ...

2013-09-19T23:59:59.000Z

375

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

376

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

377

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

378

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

379

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

380

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

U-003:RPM Package Manager security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03:RPM Package Manager security update 03:RPM Package Manager security update U-003:RPM Package Manager security update October 4, 2011 - 1:30pm Addthis PROBLEM: A vulnerability was reported in RPM Package Manager. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 4.9.1.1 and prior versions. ABSTRACT: RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: RPM Package Manager Advisory RHSA-2011:1349-1 SecurityTracker Alert ID: 1026134 CVE-2011-3378 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted RPM package that, when queried or installed by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code

382

V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and e.g. create or read arbitrary files within or outside the webroot. 2) An error when validating file names within the file renaming functionality can be exploited to bypass the denied file extensions check

383

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

384

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

385

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

386

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

387

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

388

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

389

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

390

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

391

Detector Advisory Panel (DAP) Report  

NLE Websites -- All DOE Office Websites (Extended Search)

ATLAS Project Manager's Review ATLAS Project Manager's Review 1-2 April 2010 Panel Members Lothar Bauerdick, FNAL Ray Larsen, SLAC Ronald Lipton, FNAL David Morrison, BNL Robert Roser, FNAL Steve Wolbers, FNAL Brookhaven National Laboratory Upton, New York 10 May 2010 Executive Summary The Detector and Computing Advisory Panels (DAP and CAP) reviewed the status and plans of the US-ATLAS Program at Brookhaven National Laboratory on April 1-2, 2010. The Panel was extremely pleased to hear of the highly successful commissioning of the ATLAS detector during early LHC collisions. The detector operated successfully, with no worse than 97% active channel count in any subsystem, from the start of collisions. There appears to be an excellent understanding of the detector performance via simulations. The BNL computing center has

392

Media advisory: breakfast and brilliance . . .  

NLE Websites -- All DOE Office Websites (Extended Search)

Creating our tomorrows, LDRD Day 2012 Creating our tomorrows, LDRD Day 2012 Media advisory: breakfast and brilliance . . . Media are invited to the annual celebration of Laboratory Directed Research and Development (LDRD) projects on October 23. October 17, 2012 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Contact Nancy Ambrosiano

393

Electricity Advisory Committee Meeting Agenda  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6-13-11 6-13-11 1 Electricity Advisory Committee Meeting Agenda July 12, 2011 8:30 am - 4:30 pm EST 8:30 - 8:45 am WELCOME and Introductions 8:45 - 9:15 am U.S. Department of Energy Priorities to Facilitate Development of the Nation's Electric Infrastructure 9:15 -10:45 am Roadmap 2050: a Practical Guide to a Prosperous, Low-Carbon Europe Presentation and Discussion of Report by the European Climate Foundation 10:45 - 11:00 am Break 11:00 - 11:45 am White House Grid Modernization Report Presentation and Discussion of Report on Smart Grid 11:45 - 12:00 pm SMART GRID SUBCOMMITTEE Discussion of Subcommittee Deliverables 12:00 - 1:15 pm Lunch 1:15 pm - 2:30 pm Presentation and Discussion on Energy Storage Technology Policy and Financial

394

National Atmospheric Release Advisory Center  

NLE Websites -- All DOE Office Websites (Extended Search)

NARAC TOC NARAC TOC The National Atmospheric Release Advisory Center, NARAC, provides tools and services to the Federal Government, that map the probable spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC provides atmospheric plume predictions in time for an emergency manager to decide if taking protective action is necessary to protect the health and safety of people in affected areas. Located at the Lawrence Livermore National Laboratory, NARAC is a national support and resource center for planning, real-time assessment, emergency response, and detailed studies of incidents involving a wide variety of hazards, including nuclear, radiological, chemical, biological, and natural emissions. In an emergency situation (if lives are at risk), event-specific NARAC

395

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

396

Integrated Southern Africa Business Advisory INSABA | Open Energy  

Open Energy Info (EERE)

Integrated Southern Africa Business Advisory INSABA Integrated Southern Africa Business Advisory INSABA Jump to: navigation, search Name Integrated Southern Africa Business Advisory (INSABA) Place Berlin, Germany Zip 10785 Sector Renewable Energy Product Berlin-based, high profile business advisory network for renewable energy. References Integrated Southern Africa Business Advisory (INSABA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Integrated Southern Africa Business Advisory (INSABA) is a company located in Berlin, Germany . References ↑ "Integrated Southern Africa Business Advisory (INSABA)" Retrieved from "http://en.openei.org/w/index.php?title=Integrated_Southern_Africa_Business_Advisory_INSABA&oldid=347010

397

DOE Announces Membership of New Electricity Advisory Committee, April 17,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Membership of New Electricity Advisory Committee, Membership of New Electricity Advisory Committee, April 17, 2008 DOE Announces Membership of New Electricity Advisory Committee, April 17, 2008 DOE Press Release announcing membership of the new Electricity Advisory Committee. DOE anounced the members of its newly-established Electricity Advisory Committee. Thirty innaugural members will serve one or two year terms and include some of the nation's top public and private sector leaders in electricity policy, planning and operations. DOE Announces Membership of New Electricity Advisory Committee, April 17, 2008 More Documents & Publications Electricity Advisory Committee: 2008 Membership Roster Electricity Advisory Committee Meeting, May 20, 2008: Minutes Blackout 2003: Energy Secretary Bodman and Minister of Natural Resources

398

Alternative Fuels Data Center: Propane Tank Overfill Safety Advisory  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Publications » Technology Bulletins Publications » Technology Bulletins Printable Version Share this resource Send a link to Alternative Fuels Data Center: Propane Tank Overfill Safety Advisory to someone by E-mail Share Alternative Fuels Data Center: Propane Tank Overfill Safety Advisory on Facebook Tweet about Alternative Fuels Data Center: Propane Tank Overfill Safety Advisory on Twitter Bookmark Alternative Fuels Data Center: Propane Tank Overfill Safety Advisory on Google Bookmark Alternative Fuels Data Center: Propane Tank Overfill Safety Advisory on Delicious Rank Alternative Fuels Data Center: Propane Tank Overfill Safety Advisory on Digg Find More places to share Alternative Fuels Data Center: Propane Tank Overfill Safety Advisory on AddThis.com... Propane Tank Overfill Safety Advisory

399

Electricity Advisory Committee Meeting March 5-6, 2012 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electricity Advisory Committee Meeting March 5-6, 2012 Electricity Advisory Committee Meeting March 5-6, 2012 February 17, 2012 - 5:28pm Addthis The next meeting of the Department...

400

Open Electricity Advisory Committee Meeting Oct 19-20, 2011 ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Open Electricity Advisory Committee Meeting Oct 19-20, 2011 Open Electricity Advisory Committee Meeting Oct 19-20, 2011 September 27, 2011 - 4:08pm Addthis PUBLIC IS ENCOURAGED TO...

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

June 5 & 6, 2013 Meeting of the Electricity Advisory Committee...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2013 Meetings June 5 & 6, 2013 Meeting of the Electricity Advisory Committee June 5 & 6, 2013 Meeting of the Electricity Advisory Committee June 5 & 6, 2013 Meeting of the...

402

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

403

Blackhat Revelations: Securing the network: changing priorities  

Science Conference Proceedings (OSTI)

May need to be upgraded as often as sys admins. apply patches Mike Lynn, a former ISS researcher held the Blackhat conference spellbound with his demonstration of the execution of shell code on a Cisco device. He showed what is possible if a vulnerability ...

Bruce Potter

2005-08-01T23:59:59.000Z

404

ULTRA-DEEP WATER ADVISORY COMMITTEE FINDINGS AND  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ULTRA-DEEP WATER ADVISORY COMMITTEE FINDINGS AND RECOMMENDATIONS 2014 ULTRA-DEEPWATER ADVISORY COMMITTEE COMMITTEE FINDINGS AND RECOMMENDATIONS i Table of Contents Research and Development Program Committee ............................................ 1 Sunset Committee .................................................................................................. 5 Advisory Committee Members ........................................................................... 7 ULTRA-DEEPWATER ADVISORY COMMITTEE COMMITTEE FINDINGS AND RECOMMENDATIONS 1 Research and Development Program Committee The R&D Program Subcommittee of the UDAC notes that the 2014 Annual Plan has continued to take into account safety and environment in several aspects of the proposed

405

New MEP Advisory Board White Paper Assesses the Present ...  

Science Conference Proceedings (OSTI)

New MEP Advisory Board White Paper Assesses the Present and Future of American Manufacturing. For Immediate Release: April 13, 2010. ...

2010-10-05T23:59:59.000Z

406

Airport Advisory Council: March 19, 2007 Meeting Proceedings  

Science Conference Proceedings (OSTI)

This report contains the minutes for the meeting of the Airport Advisory Council, held March 19, 2007 in Orlando, Florida.

2007-10-09T23:59:59.000Z

407

DOE M 515.1-1, Advisory Committee Management Program  

Directives, Delegations, and Requirements

The Manual provides detailed DOE requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory ...

2007-10-22T23:59:59.000Z

408

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

409

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

410

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

411

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

412

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

413

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

414

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

415

U-117: Potential security vulnerability has been identified with certain HP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Potential security vulnerability has been identified with 7: Potential security vulnerability has been identified with certain HP printers and HP digital senders U-117: Potential security vulnerability has been identified with certain HP printers and HP digital senders March 5, 2012 - 7:00am Addthis PROBLEM: The vulnerability could be exploited remotely to install unauthorized printer firmware. PLATFORM: Select HP printers and Digital Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. reference LINKS: Vendor Advisory CVE-2011-4161 Previous JC3 Advisory Bulletin IMPACT ASSESSMENT: High Discussion: The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, 4xxx, 5550, 9500, CMxxxx, CPxxxx, and Enterprise CPxxxx;

416

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

417

T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update 8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 February 16, 2011 - 7:00am Addthis PROBLEM: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011. PLATFORM: JDK and JRE 6 Update 23 and earlier for Windows, Solaris, and Linux JDK 5.0 Update 27 and earlier for Solaris 9 SDK 1.4.2_29 and earlier for Solaris 8 JDK and JRE 6 Update 23 and earlier for Windows, Solaris and Linux JDK and JRE 5.0 Update 27 and earlier for Windows, Solaris and Linux SDK and JRE 1.4.2_29 and earlier for Windows, Solaris and Linux ABSTRACT: This Critical Patch Update contains 21 new security fixes for Oracle Java SE and Java for Business. 19 of these vulnerabilities may be remotely

418

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

419

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

420

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

422

U-190: Microsoft Security Bulletin MS12-037 - Critical | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Microsoft Security Bulletin MS12-037 - Critical 0: Microsoft Security Bulletin MS12-037 - Critical U-190: Microsoft Security Bulletin MS12-037 - Critical June 13, 2012 - 3:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-037 - Critical PLATFORM: Internet Explorer 8.x ABSTRACT: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. LINKS: Microsoft Security Bulletin MS12-037 - Critical Secunia Advisory SA49412 IMPACT ASSESSMENT: High Discussion: The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who

423

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

424

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

425

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

426

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

427

Armenia-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Armenia-UNEP Green Economy Advisory Services Armenia-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Armenia-UNEP Green Economy Advisory Services Name Armenia-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Land Focus Area Agriculture, People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Website http://www.unep.org/greenecono Program Start 2011 Country Armenia Western Asia References UNEP Green Economy Advisory Services[1]

428

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

429

RHIC DETECTOR ADVISORY COMMITTEE Report  

NLE Websites -- All DOE Office Websites (Extended Search)

RHIC RHIC DETECTOR ADVISORY COMMITTEE Report of Review on Nov. 22, 2003 at BNL 1. Introduction The committee, consisting of Peter Braun-Munzinger (chair), Russell Betts, Carl Haber, Berndt Mueller, Rick Van Berg, and Jerry Va'vra 1 , met for the second time on Nov. 22, 2003 at BNL, chiefly to evaluate proposals by the STAR collaboration on their "MRPC TOF Detector" and by the PHENIX collaboration on their "Si-Tracker". Brief reports were also heard on the progress of the various R&D efforts in STAR and PHENIX but time was too short to make a detailed assessment of those. This report will hence concentrate on the main proposals. At the end we will make some remarks on the status of R&D in general and on some technical aspects we heard in the open session. 2. STAR MRPC TOF Detector The development of a detailed proposal for a TOF in STAR, based on the MRPC tech- nology, is

430

Fusion Policy Advisory Committee (FPAC)  

Science Conference Proceedings (OSTI)

This document is the final report of the Fusion Policy Advisory Committee. The report conveys the Committee's views on the matters specified by the Secretary in his charge and subsequent letters to the Committee, and also satisfies the provisions of Section 7 of the Magnetic Fusion Energy Engineering Act of 1980, Public Law 96-386, which require a triennial review of the conduct of the national Magnetic Fusion Energy program. Three sub-Committee's were established to address the large number of topics associated with fusion research and development. One considered magnetic fusion energy, a second considered inertial fusion energy, and the third considered issues common to both. For many reasons, the promise of nuclear fusion as a safe, environmentally benign, and affordable source of energy is bright. At the present state of knowledge, however, it is uncertain that this promise will become reality. Only a vigorous, well planned and well executed program of research and development will yield the needed information. The Committee recommends that the US commit to a plan that will resolve this critically important issue. It also outlines the first steps in a development process that will lead to a fusion Demonstration Power Plant by 2025. The recommended program is aggressive, but we believe the goal is reasonable and attainable. International collaboration at a significant level is an important element in the plan.

Not Available

1990-09-01T23:59:59.000Z

431

Remarks to the Electricity Advisory Committee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Remarks to the Electricity Advisory Committee Remarks to the Electricity Advisory Committee May 20, 2008 Thank you all for being here today. My colleagues and I truly appreciate the time and personal commitment each of you has made in accepting your invitations to serve on the Department's newest advisory committee. We are on the verge of some profound and challenging changes in the electric sector. This is an exciting time to be working on electricity matters. I believe this committee of leaders, thinkers, and experts has the potential to make some very important contributions to what needs to become a coordinated, transformative effort that will have positive results for the future of every American. I especially want to thank Linda Stuntz for agreeing to chair the committee and

432

JGI - Prokaryotic Super Program Advisory Committee Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

Prokaryotic Super Program Advisory Committee Meeting Prokaryotic Super Program Advisory Committee Meeting Members Cameron Currie, University of Wisconsin Ed DeLong, MIT Jed Fuhrman, University of Southern California George Garrity, MSU Steve Hallam, University of British Columbia Bob Landick, Great Lakes Bioenergy Research Center Folker Meyer, Argonne National Laboratory Nancy Moran, Yale University Mary Ann Moran, University of Georgia Karen Nelson, JCVI Rich Roberts, NEB Doug Rusch, J. Craig Venter Institute Ramunas Stepanauskas, Bigelow Laboratory for Ocean Sciences Niels van der Lelie, RTI Phil Hugenholtz, University of Queensland Home > About Us > JGI Management > Prokaryotic Super Program Advisory Committee Meeting UC logo DOE logo Contact Us Credits Disclaimer Access KeysAccessibility/Section 508 ©1997-2013 The Regents of the University of California Page Last Updated

433

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

434

Notice of Reestablishment of the Electricity Advisory Committee: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Reestablishment of the Electricity Advisory Committee: Reestablishment of the Electricity Advisory Committee: Federal Register Notice Volume 75, No. 135 - Jul. 15, 2010 Notice of Reestablishment of the Electricity Advisory Committee: Federal Register Notice Volume 75, No. 135 - Jul. 15, 2010 Notice is hereby given that the Electricity Advisory Committee has been reestablished for a two-year period. The Committee will provide advice to the Office of Electricity Delivery and Energy Reliability (DOE), on its programs to modernize the nation's electric power system. Notice of Reestablishment of the Electricity Advisory Committee More Documents & Publications Electricity Advisory Committee Meeting Notice of Open Meeting October 29, 2010: Federal Register Notice Volume 75, No. 192 - Oct. 5, 2010 DOE Manual - ADVISORY COMMITTEE MANAGEMENT PROGRAM

435

DOE Announces Membership of New Electricity Advisory Committee, April 17,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Announces Membership of New Electricity Advisory Committee, DOE Announces Membership of New Electricity Advisory Committee, April 17, 2008 DOE Announces Membership of New Electricity Advisory Committee, April 17, 2008 DOE Press Release announcing membership of the new Electricity Advisory Committee. DOE anounced the members of its newly-established Electricity Advisory Committee. Thirty innaugural members will serve one or two year terms and include some of the nation's top public and private sector leaders in electricity policy, planning and operations. DOE Announces Membership of New Electricity Advisory Committee, April 17, 2008 More Documents & Publications Electricity Advisory Committee: 2008 Membership Roster Blackout 2003: Energy Secretary Bodman and Minister of Natural Resources for Canada Lunn Release the 2003 Power Outage Final Report, October 3, 2006

436

Federal Advisory Committee Act of 1972 | Open Energy Information  

Open Energy Info (EERE)

Act of 1972 Act of 1972 Jump to: navigation, search Statute Name Federal Advisory Committee Act of 1972 Year 1972 Url [[File:|160px|link=http://www.gsa.gov/portal/content/100916]] Description The Federal Advisory Committee Act became law in 1972 and is the legal foundation defining how federal advisory committees operate. The law has special emphasis on open meetings, chartering, public involvement, and reporting. References Federal Advisory Committee Act of 1972 (annotated and un-annotated)[1] The Federal Advisory Committee Act became law in 1972 and is the legal foundation defining how federal advisory committees operate. The law has special emphasis on open meetings, chartering, public involvement, and reporting. References ↑ "Federal Advisory Committee Act of 1972 (annotated and

437

Electricity Advisory Committee (EAC) - Archived Meetings 2008 - 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Electricity Advisory Committee » Electricity Advisory Services » Electricity Advisory Committee » Electricity Advisory Committee (EAC) - Archived Meetings 2008 - 2012 Electricity Advisory Committee (EAC) - Archived Meetings 2008 - 2012 Past meetings of the Electricity Advisory Committee (EAC) 2012 Meetings: March 5 & 6, 2012 June 11 & 12, 2012 October 15 & 16, 2012 2011 Meetings: March 10, 2011 July 12, 2011 October 19 & 20, 2011 2010 Meeting: October 29, 2010 No meetings took place in 2009. 2008 Meetings: May 20, 2008 September 25-26, 2008 December 11, 2008 Contact Mr. Matthew Rosenbaum U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Washington, DC 20585 202-812-0542 matthew.rosenbaum@hq.doe.gov Electricity Advisory Committee 2013 Meetings Archived Meetings 2008-2012

438

Federal Register Notice For Electricity Advisory Committee - October 19 and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Register Notice For Electricity Advisory Committee - Register Notice For Electricity Advisory Committee - October 19 and 20th, 2011 Federal Register Notice For Electricity Advisory Committee - October 19 and 20th, 2011 This notice announces a meeting of the Electricity Advisory Committee (EAC). The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770) requires that public notice of this meeting be announced in the Federal Register. DATES: Wednesday, October 19, 2011: 2 p.m.-5 p.m. E.D.T. Thursday, October 20, 2011: 8 a.m.- 4 p.m. E.D.T. ADDRESSES: National Rural Electric Cooperative Association, 4301Wilson Boulevard, Arlington, Virginia 22203. Advisory_Board_Meetings_Pub_Sept27.pdf More Documents & Publications Electricity Advisory Committee Notice of Open Meeting October 19 and 20, 2011: Federal Register Notice Volume 76, No. 187 - Sep. 27, 2011

439

DOE Electricity Advisory Committee Meeting Arlington, Virginia  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Electricity Advisory Committee Meeting DOE Electricity Advisory Committee Meeting Arlington, Virginia October 29, 2010 Minutes EAC Members in Attendance Richard Cowart, Chair Regulatory Assistance Project The Honorable Lauren Azar, Vice Chair Wisconsin Public Utilities Commission Guido Bartels, IBM Rick Bowen, Alcoa Frederick Butler Salmon Ventures Ltd. Ralph Cavanagh Natural Resources Defense Council Lisa Crutchfield National Grid USA The Honorable Robert Curry New York State Public Service Commission José Delgado Roger Duncan Robert Gramlich American Wind Energy Association Michael Heyeck American Electric Power Joseph Kelliher NextEra Energy, Inc. Edward Krapels Anbaric Holdings Barry Lawson National Rural Electric Cooperative Association

440

Community Advisory Council, Brookhaven National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

The Community Advisory Council The Community Advisory Council Council Members > Don Garber Affiliated Brookhaven Civic Organizations Margaret Malloy American Physical Society Arnie Peskin Brookhaven Retired Employee Association Jim Heil Brookhaven Senior Citizens Office Adrienne Esposito Citizens Campaign for the Environment Christine Birben Colonial Woods / Whispering Pines Paul Ziems Coram Civic Association Michael Giacomaro East Yaphank Civic Association Jean Mannhaupt Emeritus Ed Kaplan Friends of Brookhaven Mary Joan Shea Huntington Breast Cancer Coalition Karen Blumer Individual Greg Bush Individual Iqbal Chaudhry Individual Jane Corrarino Individual Scott Krsnak Int'l Brotherhood of Electrical Workers Rita Biss Lake Panamoka Civic Association Richard Amper Long Island Pine Barrens Society David Sprintzen

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

442

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

443

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

444

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

445

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

446

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

447

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

448

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

449

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

450

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

451

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

452

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

453

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

454

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

455

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

456

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

457

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

458

Cisco 1841 and Cisco 2801 Integrated Services Router FIPS ...  

Science Conference Proceedings (OSTI)

... Off Inverter booting Inverter ready No inverter power Table A1 L-3 GCS SDN-L BBM Front Panel Indicators Page 33. Copyright ...

2011-06-07T23:59:59.000Z

459

NATURAL GAS ADVISORY COMMITTEE Name Affiliation Sector  

E-Print Network (OSTI)

NATURAL GAS ADVISORY COMMITTEE 2011-2013 Name Affiliation Sector Dernovsek, David Bonneville Power Defenbach, Byron Intermountain Gas Distribution Dragoon, Ken NWPCC Council Friedman, Randy NW Natural Gas Distribution Gopal, Jairam Southern CA Edison Electric Utility Hamilton, Linda Shell Trading Gas & Power

460

[Environmental Hazards Assessment Program annual report, June 1992--June 1993]. Environmental risk management Advisory Committee handbook  

SciTech Connect

This Handbook contains information about the objectives of the Environmental Hazards Assessment Program, the make-up of the Advisory Committee and Advisory Committee procedures. Functions of the Advisory Committee are outlined, along with guidelines for meetings and establishing agendas.

Not Available

1993-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

462

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

463

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

464

Cisco 5915 Embedded Services Routers  

Science Conference Proceedings (OSTI)

... keys stored in Dynamic Random Access ... health, temperature, memory status, voltage, packet statistics ... user rights, and restore router configurations. ...

2013-04-12T23:59:59.000Z

465

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

466

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

467

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

468

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

469

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

470

Sandia Lab Executive Joins NIST Advisory Group  

Science Conference Proceedings (OSTI)

... State, Justice, Homeland Security, the Nuclear Regulatory Commission, and the ... with organizations such as the International Atomic Energy Agency ...

2011-04-05T23:59:59.000Z

471

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

472

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

473

V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Struts DefaultActionMapper Redirection and OGNL 0: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities July 18, 2013 - 6:00am Addthis PROBLEM: Two weaknesses and multiple vulnerabilities have been reported in Apache Struts PLATFORM: Apache Struts 2.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions REFERENCE LINKS: Secunia Advisory SA54118 Apache Security Bulletin S2-16 Apache Security Bulletin S2-17 CVE-2013-2248 CVE-2013-2251 IMPACT ASSESSMENT: High DISCUSSION: 1) Input passed via the "redirect:" and "redirectAction:" prefixing parameters is not properly verified in the DefaultActionMapper class

474

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

475

V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat Security Bypass and Denial of Service 7: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities November 6, 2012 - 6:00am Addthis PROBLEM: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities PLATFORM: Apache Tomcat 5.x Apache Tomcat 6.x Apache Tomcat 7.x ABSTRACT: Two vulnerabilities were reported in Apache Tomcat REFERENCE LINKS: Apache.org Apache Tomcat Denial of Service Apache Tomcat DIGEST authentication weaknesses Secunia Advisory SA51138 CVE-2012-2733 CVE-2012-3439 IMPACT ASSESSMENT: Medium DISCUSSION: A weakness and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). 1) An error within the "parseHeaders()" function

476

V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability 7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability July 11, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Adobe ColdFusion PLATFORM: The vulnerability is reported in version 10 for Windows, Macintosh, and Linux ABSTRACT: The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets REFERENCE LINKS: Secunia Advisory SA54024 Adobe Security Bulletin APSB13-19 Stackoverflow.com CVE-2013-3350 IMPACT ASSESSMENT: High DISCUSSION: The hotfix resolves a vulnerability that could permit an attacker to invoke public methods on ColdFusion Components (CFC) using WebSockets IMPACT: Security Bypass

477

arXiv.org help - arXiv Scientific Advisory Board  

NLE Websites -- All DOE Office Websites (Extended Search)

as chair of Computer Science Advisory Committee) Greg Kuperberg, Professor of Mathematics, University of California, Davis (ex officio, as chair of Mathematics Advisory...

478

HEP Advisory Committees | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Advisory Committees High Energy Physics (HEP) HEP Home About HEP HEP Research HEP Facilities HEP Science Highlights Benefits of HEP HEP Funding Opportunities HEP Advisory...

479

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

480

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

Note: This page contains sample records for the topic "advisory cisco secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

482

Advisory Board Public Meeting Set for Webinar | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory Board Public Meeting Set for Webinar Advisory Board Public Meeting Set for Webinar Advisory Board Public Meeting Set for Webinar April 4, 2013 - 12:00pm Addthis Participants in a previous EM Site-Specific Advisory Board meeting. Participants in a previous EM Site-Specific Advisory Board meeting. The Department will host its first EM Site-Specific Advisory Board (EM SSAB) Chairs meeting via webinar on Thursday, April 25, 2013, from 1 to 5:30 p.m. Eastern Daylight Time. The purpose of the webinar is to provide an opportunity for EM SSAB Chairs and members of their local boards to receive presentations from EM managers and discuss crosscutting issues that impact sites and local stakeholders throughout the EM complex. Any interested stakeholders or members of the public who would like to observe the proceedings are encouraged to attend.

483

Namibia-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Namibia-UNEP Green Economy Advisory Services Namibia-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Namibia-UNEP Green Economy Advisory Services Name Namibia-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Namibia Southern Africa References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

484

China-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

China-UNEP Green Economy Advisory Services China-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: China-UNEP Green Economy Advisory Services Name China-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country China Eastern Asia References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

485

Indonesia-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Indonesia-UNEP Green Economy Advisory Services Indonesia-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Indonesia-UNEP Green Economy Advisory Services Name Indonesia-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Indonesia South-Eastern Asia References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

486

Electricity Advisory Committee Meeting Notice of Open Meeting October 29,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Meeting Meeting October 29, 2010: Federal Register Notice Volume 75, No. 192 - Oct. 5, 2010 Electricity Advisory Committee Meeting Notice of Open Meeting October 29, 2010: Federal Register Notice Volume 75, No. 192 - Oct. 5, 2010 Electricity Advisory Committee Meeting. This notice announces a meeting of the reestablished Electricity Advisory Committee (EAC) on October 29, 2010. The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770) requires that public notice of these meetings be announced in the Federal Register. Electricity Advisory Committee Meeting: Notice of Open Meeting October 29, 2010 More Documents & Publications Electricity Advisory Committee Notice of Open Meeting October 19 and 20, 2011: Federal Register Notice Volume 76, No. 187 - Sep. 27, 2011

487

Jordan-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Jordan-UNEP Green Economy Advisory Services Jordan-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Jordan-UNEP Green Economy Advisory Services Name Jordan-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Jordan Western Asia References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

488

METHANE HYDRATE ADVISORY COMMITTEE U.S. Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

METHANE HYDRATE ADVISORY COMMITTEE METHANE HYDRATE ADVISORY COMMITTEE U.S. Department of Energy Advisory Committee Charter - - - - ---- ---- ------~ 1. Committee's Official Designation. Methane Hydrate Advisory Committee (MHAC) 2. Authority:. This charter establishes the Methane Hydrate Advisory Committee (Committee) pursuant to Title IX, Subtitle F, Section 968, Methane Hydrate Research of the Energy Policy Act of 2005 (EPACT), Public Law 109-58. This charter establishes the MHAC under the authority of the Department of Energy (DOE). The MHAC is being renewed in accordance with the provisions of the Federal Advisory Committee Act (FACA), as amended, 5 U.S.C., App.2. 3. Objectives and Scope of Activities. The Committee provides advice to the Secretary of Energy by developing recommendations and broad programmatic priorities for the methane

489

Electricity Advisory Committee Meeting Notice of Open Meeting March 10,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Meeting March Meeting March 10, 2011: Federal Register Notice Volume 76, No. 38 - Feb. 25, 2011 Electricity Advisory Committee Meeting Notice of Open Meeting March 10, 2011: Federal Register Notice Volume 76, No. 38 - Feb. 25, 2011 Electricity Advisory Committee Meeting. This notice announces a meeting of the reestablished Electricity Advisory Committee (EAC) on March 10, 2011. The Federal Advisory Committee Act (Pub. L. 92-463, 86 Stat. 770) requires that public notice of these meetings be announced in the Federal Register. Electricity Advisory Committee Meeting: Notice of Open Meeting March 10, 2011. More Documents & Publications EIS-0375: DOE Notice of Availability of the Draft Environmental Impact Statement Electricity Advisory Committee Notice of Open Meeting October 19 and 20,

490

Egypt-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Egypt-UNEP Green Economy Advisory Services Egypt-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Egyp-UNEP Green Economy Advisory Services Name Egyp-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Egypt Northern Africa References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

491

Montenegro-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Montenegro-UNEP Green Economy Advisory Services Montenegro-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Montenegro-UNEP Green Economy Advisory Services Name Montenegro-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Montenegro Southern Europe References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

492

Barbados-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Barbados-UNEP Green Economy Advisory Services Barbados-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Barbados-UNEP Green Economy Advisory Services Name Barbados-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Barbados Caribbean References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

493

Serbia-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Serbia-UNEP Green Economy Advisory Services Serbia-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Serbia-UNEP Green Economy Advisory Services Name Serbia-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Serbia Southern Europe References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

494

Kenya-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Kenya-UNEP Green Economy Advisory Services Kenya-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Kenya-UNEP Green Economy Advisory Services Name Kenya-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Kenya Eastern Africa References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

495

EM Reviews Budget, Technology Challenges with Advisory Board | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Reviews Budget, Technology Challenges with Advisory Board Reviews Budget, Technology Challenges with Advisory Board EM Reviews Budget, Technology Challenges with Advisory Board June 21, 2013 - 12:00pm Addthis Associate Principal Deputy Assistant Secretary Alice Williams, left, and EM Senior Advisor Dave Huizenga, center, talk with Environmental Management Advisory Board Vice-Chair Dennis Ferrigno at the recent board meeting. Associate Principal Deputy Assistant Secretary Alice Williams, left, and EM Senior Advisor Dave Huizenga, center, talk with Environmental Management Advisory Board Vice-Chair Dennis Ferrigno at the recent board meeting. AUGUSTA, Ga. - EM leadership met with the Environmental Management Advisory Board (EMAB) recently to discuss a range of topics, from EM's fiscal year 2014 budget request to its technology challenges.

496

Nepal-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Nepal-UNEP Green Economy Advisory Services Nepal-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Nepal-UNEP Green Economy Advisory Services Name Nepal-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Nepal Southern Asia References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

497

Mongolia-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Mongolia-UNEP Green Economy Advisory Services Mongolia-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Mongolia-UNEP Green Economy Advisory Services Name Mongolia-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Mongolia Eastern Asia References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

498

The National Environmental Justice Advisory Committee (NEJAC) Model Plan  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The National Environmental Justice Advisory Committee (NEJAC) Model The National Environmental Justice Advisory Committee (NEJAC) Model Plan for Public Participation The National Environmental Justice Advisory Committee (NEJAC) Model Plan for Public Participation This report and recommendations have been written as a part of the activities of the NEJAC, a public advisory committee providing extramural policy information and advice to the Administrator and other officials of the U.S. Environmental Protection Agency (EPA). The Council is structured to provide balanced, expert assessment of matters related to environmental justice. This report has been reviewed by EPA. The National Environmental Justice Advisory Committee (NEJAC) Model Plan for Public Participation More Documents & Publications National Environmental Justice Advisory Council Federal Facilities Working

499

Morocco-UNEP Green Economy Advisory Services | Open Energy Information  

Open Energy Info (EERE)

Morocco-UNEP Green Economy Advisory Services Morocco-UNEP Green Economy Advisory Services Jump to: navigation, search Logo: Morocco-UNEP Green Economy Advisory Services Name Morocco-UNEP Green Economy Advisory Services Agency/Company /Organization United Nations Environment Programme (UNEP) Partner German Agency for International Cooperation (GIZ), Global Green Growth Knowledge Platform (GGKP), Green Jobs Initiative, United Nations Development Programme (UNDP), United Nations Department of Economic and Social Affairs (UNDESA) Sector Climate, Energy, Land, Water Focus Area People and Policy Topics Co-benefits assessment, Low emission development planning, -LEDS Country Morocco Northern Africa References UNEP Green Economy Advisory Services[1] Overview "UNEP Green Economy Advisory Services consist of policy advice, technical

500

Electricity Advisory Committee (EAC) - 2008 Meetings | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory Committee » Archived Meetings Advisory Committee » Archived Meetings 2008-2012 » Electricity Advisory Committee (EAC) - 2008 Meetings Electricity Advisory Committee (EAC) - 2008 Meetings DECEMBER 11, 2008 MEETING OF THE ELECTRICITY ADVISORY COMMITTEE Date: Thursday, December 11, 2008, 9:00 a.m. - 4:00 p.m. Location: Marriott Crystal City at Reagan National Airport; 1999 Jefferson Davis Highway; Arlington, Virginia; Potomac Salon D-E Description: The Department of Energy's Electricity Advisory Committee will hold its third meeting Thursday, December 11, 2008, 9:00 a.m. - 4:00 p.m. at the Marriott Crystal City located at 1999 Jefferson Davis Highway; Arlington, Virginia; Potomac Salon D-E. Members of the public are invited on a first-come, first served basis (depending on the availability of