Sample records for disaster management vulnerability

  1. Assessing the vulnerability of the fiber infrastructure to disasters

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

  2. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01T23:59:59.000Z

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  3. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    NONE

    1995-03-01T23:59:59.000Z

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  4. Disaster case management: Disaster case management and individuals with disabilities following Hurricane Katrina 

    E-Print Network [OSTI]

    Stough, Laura

    2011-01-01T23:59:59.000Z

    disaster case managers. Case management is frequently used by disaster relief organizations to coordinate re- sources and to provide a single-point of service delivery to those affected by disaster. Disaster case management usually involves... the development of a disaster recovery plan and has as its objective to restore a disaster victim to or near their pre-disaster living sta- tus. Faith-based organizations frequently use a case management model as a vehicle to distribute resources donated...

  5. Hazard & Disaster Management College of Science

    E-Print Network [OSTI]

    Hickman, Mark

    Hazard & Disaster Management College of Science 09 For further information about the University Postgraduate Programmes #12;PostgraduateProgrammes in Hazard & Disaster Management Postgraduate Diploma - BSc by risk management. These programmes aim to develop skills of hazard and disaster management through

  6. Disaster case management and individuals with disabilities 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    Disaster Case Management and Individuals With Disabilities Laura M. Stough and Amy N. Sharp Texas A&M University Curt Decker and Nachama Wilker National Disability Rights Network, Washington, DC Purpose: To examine the case management and disaster... recovery needs of individuals with disabilities following Hurricane Katrina. The case managers and supervisors in this study provided case management to individuals with disabilities as part of the largest coordinated disaster case management program in U...

  7. Children with disabilities in the context of disaster: A social vulnerability perspective

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    through a social vulnerability perspective they all can be seen as lacking access to vital economic and social resources, possessing lim- ited autonomy and power, and having low levels of social capital (Morrow, 1999). They also, for socio- historical... of these socially vulnerable populations, but we do not yet know what parts of the community infrastructure are most critical to support their resilience in the post- disaster context. Given the dearth of empirical studies that actu- ally explore how disaster...

  8. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  9. Evolutionary Document Summarization for Disaster Management

    E-Print Network [OSTI]

    Li, Tao

    Evolutionary Document Summarization for Disaster Management Dingding Wang Li Zheng Tao Li Yi Deng,deng}@cs.fiu.edu ABSTRACT In this poster, we develop an evolutionary document summa- rization system for discovering the changes and differences in each phase of a disaster evolution. Given a collection of document streams

  10. Workforce management strategies in a disaster scenario.

    SciTech Connect (OSTI)

    Kelic, Andjelka; Turk, Adam L.

    2008-08-01T23:59:59.000Z

    A model of the repair operations of the voice telecommunications network is used to study labor management strategies under a disaster scenario where the workforce is overwhelmed. The model incorporates overtime and fatigue functions and optimizes the deployment of the workforce based on the cost of the recovery and the time it takes to recover. The analysis shows that the current practices employed in workforce management in a disaster scenario are not optimal and more strategic deployment of that workforce is beneficial.

  11. Disaster case management: Disaster case management and individuals with disabilities following Hurricane Katrina

    E-Print Network [OSTI]

    Stough, Laura

    2011-01-01T23:59:59.000Z

    the development of a disaster recovery plan and has as its objective to restore a disaster victim to or near their pre-disaster living sta- tus. Faith-based organizations frequently use a case management model as a vehicle to distribute resources donated.... The telephone surveys conducted with each of the case man- agers and included 9 open-ended questions and 12 demographic questions. As part of the open-ended questions, case managers were asked to describe the biggest challenges that their clients...

  12. Emergency Animal Management during Disasters

    E-Print Network [OSTI]

    Dement, Angela

    2006-10-23T23:59:59.000Z

    This publication explains how communities and counties can incorporate animal issues into their emergency management plans. It explains what local plans should include, what role county Extension agents can play, and how animal management plans can...

  13. CONFIGURING A COLLABORATIVE VIRTUAL WORKSPACE FOR DISASTER MANAGEMENT OF

    E-Print Network [OSTI]

    Barbosa, Alberto

    CONFIGURING A COLLABORATIVE VIRTUAL WORKSPACE FOR DISASTER MANAGEMENT OF OIL & GAS OFFSHORE , and Börje Karlsson 5 ABSTRACT There are serious risks involved in running offshore units, with many reported workspace. Finally a prototype for oil & gas offshore structures disaster management based on our multi

  14. Defense of Trust Management Vulnerabilities in Distributed Networks

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun , Zhu Han into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five networks inherently rely on cooper- ation among distributed entities. However, coopera- tion is fragile

  15. Disaster case management and individuals with disabilities

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    -two case managers and 12 case management supervisors from this program provided services to a collective caseload of 2,047 individuals with disabilities and their families. Interviews and telephone surveys were conducted with these participants 20 –24... management process is intended to be collaborative and includes “. . . assessment, planning, facilitation, care coordination, evaluation and advocacy for options and ser- vices . . .” (Case Management Society of America, 2010, p. 8). Other functions of case...

  16. Disaster Management and Emergency Medicine in Malaysia

    E-Print Network [OSTI]

    Lee, Sharon

    2011-01-01T23:59:59.000Z

    Management and Emergency Medicine in Malaysia Sharon Lee, MDof California, Irvine School of Medicine, Departmentof Emergency Medicine, Orange, CA development of this

  17. Mobile medical disaster relief technology : enhancing communication, medical logistics, data creation, and crisis mapping for vulnerable communities

    E-Print Network [OSTI]

    Intrator, Kira (Kira Rachel)

    2012-01-01T23:59:59.000Z

    This thesis explores the field of disaster relief and recovery, and the application of emerging technologies that are both used by, and use the data generated by communities affected by natural disaster. This thesis analyzes ...

  18. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/survivability. Our discussion employs the power transmission grid. 1 Introduction

  19. How risk management can prevent future wildfire disasters in the wildland-urban interface

    E-Print Network [OSTI]

    How risk management can prevent future wildfire disasters in the wildland-urban interface David E, ecosystems, and lives is not. We propose the principles of risk analysis to provide land management agencies: turn to the principles of decision science and risk management. Similar to other forms of risk

  20. Generating Textual Storyline to Improve Situation Awareness in Disaster Management

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Natural disasters such as hurricanes, earthquakes and tsunamis cause inestimable physical destruction summaries to present the evolution of an event by leveraging temporal information attached to or extracted of the summarized results. First, most of them focus on summarizing an event via topic evolution over the time

  1. Stress in Adults after a Disaster: Warning Signs and Management

    E-Print Network [OSTI]

    Warren, Judith L.

    2005-09-30T23:59:59.000Z

    there with that person during the crisis. Increased substance abuse ? In stressful situations, some adults abuse al- cohol or other substances. Such behavior may lead to further problems at home and at work. Physical symptoms ? Adults who report physical symptoms... leaving home for fear that something terrible will happen again, or they may feel shame over their emotional reactions. There also are those who may not want to leave their family members alone so they can protect them from another pos- sible disaster...

  2. Managing the risks of extreme events and disasters to advance climate change adaptation. Special report of the Intergovernmental Panel on Climate Change (IPCC)

    SciTech Connect (OSTI)

    Field, C.B.; Barros, V.; Stocker, T.F. (and others)

    2012-07-01T23:59:59.000Z

    This Special Report on Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation (SREX) has been jointly coordinated by Working Groups I (WGI) and II (WGII) of the Intergovernmental Panel on Climate Change (IPCC). The report focuses on the relationship between climate change and extreme weather and climate events, the impacts of such events, and the strategies to manage the associated risks. This Special Report, in particular, contributes to frame the challenge of dealing with extreme weather and climate events as an issue in decision making under uncertainty, analyzing response in the context of risk management. The report consists of nine chapters, covering risk management; observed and projected changes in extreme weather and climate events; exposure and vulnerability to as well as losses resulting from such events; adaptation options from the local to the international scale; the role of sustainable development in modulating risks; and insights from specific case studies. (LN)

  3. Business Intelligence Modeling: A Case Study of Disaster Management Organization in Pakistan

    E-Print Network [OSTI]

    Fong, Chi Chiu "Simon"

    Business Intelligence Modeling: A Case Study of Disaster Management Organization in Pakistan Sohail Asghar Department of Computer Science Mohammad Ali Jinnah University, Islamabad, Pakistan e-mail: sohail@umac.mo Touqeer Hussain Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad, Pakistan e

  4. Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile Devices

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile a collaborative solution on a mobile platform using advanced data mining and information retrieval techniques.8 [Database Applications]: Data mining; H.3.3 [Information Search and Retrieval]: Clustering; H.3.5 [Online

  5. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  6. T-731:Symantec IM Manager Code Injection Vulnerability | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability

  7. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  8. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment| Department

  9. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

  10. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  11. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S. [Carnegie Mellon University, Pittsburgh, PA (United States). Dept. of Civil & Environmental Engineering

    2009-09-15T23:59:59.000Z

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  12. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  13. Power Grid Vulnerability to Geographically Correlated Failures

    E-Print Network [OSTI]

    Shepard, Kenneth

    Power Grid Vulnerability to Geographically Correlated Failures ­ Analysis and Control Implications such as telecommunications networks [14]. The power grid is vulnerable to natural disasters, such as earthquakes, hurricanes [17], [34]. Thus, we focus on the vulnerability of the power grid to an outage of several lines

  14. Corporate involvement in disaster response and recovery : an analysis of the Gujarat Earthquake

    E-Print Network [OSTI]

    Sayegh, Tracy, 1976-

    2004-01-01T23:59:59.000Z

    Disaster vulnerability is a serious issue in developing countries where globalization, development patterns, poverty and environmental degradation are placing more people at risk to natural disasters. Recent appeals for ...

  15. Researchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability

    E-Print Network [OSTI]

    Nagurney, Anna

    , electrical power supply chains and telecommunications networks. University of Massachusetts Amherst components like roads, electrical power stations or transmission lines are destroyed and captures how usersResearchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability Natural disasters

  16. Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain Age

    E-Print Network [OSTI]

    Nagurney, Anna

    , electric power, smart grid, critical infrastructure, emergency and disaster pre- paredness, mergers for the determination of network vulnerability and robustness, since critical infrastructure networks from transportation, telecommunications, supply chains, to financial and electric power ones, provide the ties

  17. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

    2012-07-01T23:59:59.000Z

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  18. Puerto Rico Disaster Decision Support Tool

    E-Print Network [OSTI]

    Firestone, Jeremy

    Puerto Rico Disaster Decision Support Tool: An innovative step towards community resilience Support Tool Pilot Internet-based scalable mapping server Emergency management geo-referenced information for all municipalities in Puerto Rico #12;Disaster Decision Support Tool (DDST) What is a GIS

  19. On the robustness of network infrastructures to disasters and physical attacks

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    2013-01-01T23:59:59.000Z

    Networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such realworld events happen in specific geographical locations ...

  20. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15T23:59:59.000Z

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  1. Nowcasting Disaster Damage

    E-Print Network [OSTI]

    Kryvasheyeu, Yury; Obradovich, Nick; Moro, Esteban; Van Hentenryck, Pascal; Fowler, James; Cebrian, Manuel

    2015-01-01T23:59:59.000Z

    Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. Additionally, spatiotemporal distribution of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy's path and hurricane-related social media activity. We show that real and perceived threats -- together with the physical disaster effects -- are directly observable through the intens...

  2. Photovoltaic application for disaster relief

    SciTech Connect (OSTI)

    Young, W.R. Jr.

    1995-11-01T23:59:59.000Z

    Hurricanes, floods, tornados, and earthquakes are natural disasters that can happen at any time destroying homes, businesses, and natural surroundings. One such disaster, Hurricane Andrew, devastated South Florida leaving several hundred-thousand people homeless. Many people were without electrical service, functioning water and sewage systems, communications, and medical services for days, even weeks in the aftermath of the storm. Emergency management teams, the military, and countless public and private organizations staged a massive relief effort. Dependency on electrical utility power became a pronounced problem as emergency services were rendered to survivors and the rebuilding process started. Many of the energy needs of emergency management organizations, relief workers, and the general public can be satisfied with solar electric energy systems. Photovoltaic (PV) power generated from solar energy is quiet, safe, inexhaustible and pollution-free. Previously, photovoltaics have supplied emergency power for Hurricanes Hugo and Andrew, and the earthquake at Northridge in Southern California. This document focuses on photovoltaic technology and its application to disaster relief efforts.

  3. Transport Planning for Disaster ManagementDisaster Management

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    : Hurricane Andrew, 19 92 Traffic congestion (www.washingtonpost.com) Source : Hurricane Evacuation R oute Shinhae Lee, Seoul Institute #12;Aerial views of damage caused by Hurricane Sandy along the New Jersey

  4. Disaster Planning for Vulnerable Populations: Leveraging Community Human Service

    E-Print Network [OSTI]

    Salzman, Daniel

    that preparing effectively for catastrophic events cannot be accomplished with a single, simple template, a function-based assessment tool, and a 5 Steps to Preparedness module. Results: Results from a survey were effectively for catastrophic events cannot be accomplished with a single, simple template. In- clusion

  5. Assessing the Vulnerability of the Fiber Infrastructure to Disasters

    E-Print Network [OSTI]

    Cohen, Reuven

    , as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real-world events-optic, Electromagnetic Pulse (EMP). I. INTRODUCTION The global communications infrastructure is primarily based on fiber by any- thing from Electromagnetic Pulse (EMP) attacks [14], [15], [31] to dragging anchors [8], [36

  6. Decision support for disaster management

    E-Print Network [OSTI]

    Rolland, Erik; Patterson, Raymond A.; Ward, Keith; Dodin, Bajis

    2010-01-01T23:59:59.000Z

    Benson 1991; Salewski and Bartsch 1994; Salewski 1995; DodinRes 102:88–110 Salewski F, Bartsch T (1994) A comparison of

  7. Emergency Animal Management during Disasters 

    E-Print Network [OSTI]

    Dement, Angela

    2006-10-23T23:59:59.000Z

    disposal sites in the local area that could be used in an emergency to dispose of diseased car- casses while minimizing the spread of the disease ? Establishing and operating inspection, cleaning and disinfection stations ? Supporting depopulation...

  8. Coordinating Energy Efficiency with Other Disaster Resiliency...

    Energy Savers [EERE]

    Coordinating Energy Efficiency with Other Disaster Resiliency Services Coordinating Energy Efficiency with Other Disaster Resiliency Services Better Buildings Residential Network...

  9. Incorporating Energy Efficiency into Disaster Recovery Efforts...

    Energy Savers [EERE]

    Incorporating Energy Efficiency into Disaster Recovery Efforts Incorporating Energy Efficiency into Disaster Recovery Efforts Better Buildings Residential Network Program...

  10. Vulnerability Scanning Policy 1 Introduction

    E-Print Network [OSTI]

    Vulnerability Scanning Policy 1 Introduction Vulnerability scanning is an important and necessary and can alert system administrators to potentially serious problems. However vulnerability scanning also to compromise system security. The following policy details the conditions under which vulnerability scans may

  11. wind engineering & natural disaster mitigation

    E-Print Network [OSTI]

    Denham, Graham

    wind engineering & natural disaster mitigation #12;wind engineering & natural disaster mitigation Investment WindEEE Dome at Advanced Manufacturing Park $31million Insurance Research Lab for Better Homes $8million Advanced Facility for Avian Research $9million #12;wind engineering & natural disaster mitigation

  12. Proceedings Hazards and Disasters

    E-Print Network [OSTI]

    Wang, Hai

    FOLLOWING 1992 HURRICANE ANDREW IN MIAMI-DADE COUNTY, FLORIDA to vulnerable populations, risk and decision making in hurricanes, recovery and reconstruction OF CHANGE............ 10 John A. Cross A DYNAMIC MODEL OF HOUSEHOLD HURRICANE EVACUATIONS ............... 13

  13. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  14. Role of Mass Media in the Disaster Preparedness and Sustainable Development of Society

    SciTech Connect (OSTI)

    Seid-Aliyeva, Dinara E. [Geology Institute, Azerbaijan National Academy of Sciences, 29A, H. Javid Ave., Baku 1143 (Azerbaijan)

    2006-03-23T23:59:59.000Z

    Better understanding of the causes and effects of large earthquakes can assists in mitigation of damage and loss of lives as a result of destructive natural events. Well-informed and educated population living in geological hazard-prone regions can reduce catastrophic consequences of natural disasters and guaranty the sustainable development of healthy society. A development of information service for disaster management is of importance in reduction of the disaster's consequences.

  15. Ecosystem Vulnerability Assessment - Patterns of Climate Change...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

  16. Recovery and Resilience After a Nuclear Power Plant Disaster: A Medical Decision model for Managing an Effective, Timely, and Balanced Response

    SciTech Connect (OSTI)

    Coleman, C. Norman [National Cancer Institute, NIH; Blumenthal, Daniel J. [National Nuclear Security Administration (NNSA), Department of Energy

    2013-05-01T23:59:59.000Z

    Based on experiences in Tokyo responding to the Fukushima Daiichi nuclear power plant crisis, a real-time, medical decision model is presented by which to make key health-related decisions given the central role of health and medical issues in such disasters. Focus is on response and recovery activities that are safe, timely, effective, and well-organized. This approach empowers on-site decision makers to make interim decisions without undue delay using readily available and high-level scientific, medical, communication, and policy expertise. Key features of this approach include ongoing assessment, consultation, information, and adaption to the changing conditions. This medical decision model presented is compatible with the existing US National Response Framework structure.

  17. Preventing Fraud Following a Disaster 

    E-Print Network [OSTI]

    Cavanagh, Joyce

    2005-10-11T23:59:59.000Z

    After a natural disaster, people may be susceptible to price gouging, home repair fraud and identity theft. This publication explains how to protect yourself from these problems....

  18. HUD National Disaster Resilience Competition

    Broader source: Energy.gov [DOE]

    The U.S. Department of Housing and Urban Development (HUD) is making $1 billion in HUD Disaster Recovery funds available to eligible communities.

  19. Preventing Fraud Following a Disaster

    E-Print Network [OSTI]

    Cavanagh, Joyce

    2005-10-11T23:59:59.000Z

    After a natural disaster, people may be susceptible to price gouging, home repair fraud and identity theft. This publication explains how to protect yourself from these problems....

  20. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities

    E-Print Network [OSTI]

    Narasayya, Vivek

    programs by exploiting browser vulnerabilities are a serious emerging threat. In response, we have-management methodology to cybersecurity: instead of directly detecting the acts of vulnerability exploits, the system

  1. Review: The Great Lead Water Pipe Disaster

    E-Print Network [OSTI]

    Karalus, Daniel E

    2010-01-01T23:59:59.000Z

    Review: The Great Lead Water Pipe Disaster By WernerUSA Troesken, Werner. The Great Lead Water Pipe Disaster.paper. Alkaline paper. Lead poisoning usually conjures

  2. Wind Engineering & Natural Disaster Mitigation

    E-Print Network [OSTI]

    Denham, Graham

    Wind Engineering & Natural Disaster Mitigation For more than 45 years, Western University has been internationally recognized as the leading university for wind engineering and wind- related research. Its of environmental disaster mitigation, with specific strengths in wind and earthquake research. Boundary Layer Wind

  3. Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011 The following) section on Chemical-Terrorism Vulnerability Information (CVI) 6 CFR 27.400. The Program Manager's comments.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating

  4. Disaster and disabilities

    E-Print Network [OSTI]

    Stough, Laura

    2014-01-01T23:59:59.000Z

    , the National Council on Disability (2006) reported that many people with phys- ical disabilities were unable to evacuate during Hurricane Katrina due to inaccessible transportation. Three weeks later, during Hurricane Rita, deaf evacuees encountered numerous... as they are physically more vulnerable and rely on adults for psy- chological and custodial support (Peek & Stough, 2010). Educational programs for children may also be affected, for example, special education services were disrupted for several months followingHurricane...

  5. Assessment of Chemical and Radiological Vulnerabilities

    SciTech Connect (OSTI)

    SETH, S.S.

    2000-05-17T23:59:59.000Z

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities.

  6. Disaster Tolerant Computer and Communication Systems Stephen A. SZYGENDA

    E-Print Network [OSTI]

    Thornton, Mitchell

    Management, Information and Systems, SMU Department of Computer Science and Engineering, SMU Dallas, Texas, 75275, U.S.A. and Mitchell A. THORNTON Department of Computer Science and Engineering, SMU Department of Electrical Engineering, SMU Dallas, Texas, 75275, U.S.A. ABSTRACT Disaster Tolerance is the characteristic

  7. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01T23:59:59.000Z

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  8. National Disaster Resilience Competition Webinar

    Broader source: Energy.gov [DOE]

    Communities recovering from natural disasters have an important choice: rebuild damaged areas as they were, or put investments and policy changes in place that help them to be more resilient to...

  9. Empirical Estimates of 0Day Vulnerabilities in Control Systems

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Sean M. McBride; Trevor A. McQueen

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, which has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to well managed control systems which have already effectively mitigated the publicly known vulnerabilities. In these well managed systems the risk contribution from 0Days will have proportionally increased. To aid understanding of how great a risk 0Days may pose to control systems, an estimate of how many are in existence is needed. Consequently, using the 0Day definition given above, we developed and applied a method for estimating how many 0Day vulnerabilities are in existence on any given day. The estimate is made by: empirically characterizing the distribution of the lifespans, measured in days, of 0Day vulnerabilities; determining the number of vulnerabilities publicly announced each day; and applying a novel method for estimating the number of 0Day vulnerabilities in existence on any given day using the number of vulnerabilities publicly announced each day and the previously derived distribution of 0Day lifespans. The method was first applied to a general set of software applications by analyzing the 0Day lifespans of 491 software vulnerabilities and using the daily rate of vulnerability announcements in the National Vulnerability Database. This led to a conservative estimate that in the worst year there were, on average, 2500 0Day software related vulnerabilities in existence on any given day. Using a smaller but intriguing set of 15 0Day software vulnerability lifespans representing the actual time from discovery to public disclosure, we then made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day software vulnerabilities in existence on any given day. We then proceeded to identify the subset of software applications likely to be used in some control systems, analyzed the associated subset of vulnerabilities, and characterized their lifespans. Using the previously developed method of analysis, we very conservatively estimated 250 control system related 0Day vulnerabilities in existence on any given day. While reasonable, this first order estimate for control systems is probably far more conservative than those made for general software systems since the estimate did not include vulnerabilities unique to control system specific components. These control system specific vulnerabilities were unable to be included in the estimate for a variety of reasons with the most problematic being that the public announcement of unique control system vulnerabilities is very sparse. Consequently, with the intent to improve the above 0Day estimate for control systems, we first identified the additional, unique to control systems, vulnerability estimation constraints and then investigated new mechanisms which may be useful for estimating the number of unique 0Day software vulnerabilities found in control system components. We proceeded to identify a number of new mechanisms and approaches for estimating and incorporating control system specific vulnerabilities into an improved 0Day estimation method. These new mechanisms and approaches appear promising and will be more rigorously evaluated during the course of the next year.

  10. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  11. Applying photovoltaics to disaster relief

    SciTech Connect (OSTI)

    Young, W. Jr. [Florida Solar Energy Center, Cocoa, FL (United States)

    1996-11-01T23:59:59.000Z

    Hurricanes, floods, tornados, earthquakes and other disasters can happen at any time, often with little or no advance warning. They can be as destructive as Hurricane Andrew leaving several hundred-thousand people homeless or as minor as an afternoon thunderstorm knocking down local power lines to your home. Major disasters leave many people without adequate medical services, potable water, electrical service and communications. In response to a natural disaster, photovoltaic (solar electric) modules offer a source of quiet, safe, pollution-free electrical power. Photovoltaic (PV) power systems are capable of providing the electrical needs for vaccine refrigerators, microscopes, medical equipment, lighting, radios, fans, communications, traffic devices and other general electrical needs. Stand alone PV systems do not require refueling and operate for long period of time from the endless energy supplied by the sun, making them beneficial during recovery efforts. This report discusses the need for electrical power during a disaster, and the capability of PV to fill that need. Applications of PV power used during previous disaster relief efforts are also presented.

  12. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  13. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

  14. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20T23:59:59.000Z

    in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Chair of Committee, Gary Wingenbach Committee Members, Theresa P. Murphrey Leonardo Lombardini Head of Department, John Elliot December 2014 Major Subject...; (c) health; (d) social networks; (e) food; (f) water; and (g) natural disasters and climate variability (Hahn et al., 2009). The Hahn et al. (2009) study took this vulnerability framework a step further by determining which secondary components...

  15. Optimal Organizational Hierarchies: Source Coding: Disaster Relief

    E-Print Network [OSTI]

    Murthy, G Rama

    2011-01-01T23:59:59.000Z

    ulticasting is an important communication paradigm for enabling the dissemination of information selectively. This paper considers the problem of optimal secure multicasting in a communication network captured through a graph (optimal is in an interesting sense) and provides a doubly optimal solution using results from source coding. It is realized that the solution leads to optimal design (in a well defined optimality sense) of organizational hierarchies captured through a graph. In this effort two novel concepts : prefix free path, graph entropy are introduced. Some results of graph entropy are provided. Also some results on Kraft inequality are discussed. As an application Hierarchical Hybrid Communication Network is utilized as a model of structured Mobile Adhoc network for utility in Disaster Management. Several new research problems that naturally emanate from this research are summarized.

  16. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  17. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01T23:59:59.000Z

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  18. Historical and projected costs of natural disasters

    SciTech Connect (OSTI)

    Engi, D.

    1995-04-01T23:59:59.000Z

    Natural disasters cause billions of dollars of damage and thousands Of deaths globally each year. While the magnitude is clear, the exact costs (in damage and fatalities) are difficult to clearly identify. This document reports on the results of a survey of data on the costs associated with significant natural disasters. There is an impressive amount of work and effort going into natural disaster research, mitigation, and relief. However, despite this effort, there are surprisingly few consistent and reliable data available regarding the effects of natural disasters. Even lacking consistent and complete data, it is clear that the damage and fatalities from natural disasters are increasing, both in the United States, and globally. Projections using the available data suggest that, in the United States alone, the costs of natural disasters between 1995 and 2010 will be in the range of $90 billion (94$) and 5000 lives.

  19. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01T23:59:59.000Z

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  20. From Tragedy to Triumph - Rebuilding Green Buildings after Disaster...

    Office of Environmental Management (EM)

    Rebuilding Green Buildings after Disaster, EERE (Fact Sheet) From Tragedy to Triumph - Rebuilding Green Buildings after Disaster, EERE (Fact Sheet) Fact sheet offering practical...

  1. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  2. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  3. Helping Children Cope with Disaster

    E-Print Network [OSTI]

    FCS Project Team - FDRM UNIT

    2005-09-30T23:59:59.000Z

    , expressive activities, education on disasters, preparedness planning and identifying at-risk children. ? Long-term problems Some children may have long-term problems such as depression, prolonged grief and post-traumatic stress disorder (PTSD). Therefore... they are 11 years old are three times more likely to develop psycho- logical symptoms than those who experience their first trauma as a teenager or later in life. Birth to age 2 Children younger than 2 have little understanding of cause-and-effect relation...

  4. Deepwater Horizon Disaster Professor Satish Nagarajaiah

    E-Print Network [OSTI]

    Nagarajaiah, Satish

    Systems Research @ Rice Source: MMS and BP #12;April 20, 2010 At approximately 10 pm Horizon Rig disaster;Collapse / Oil Spill Offshore and Marine Systems Research @ Rice Source: NYT/AP/flickr #12;Horizon BeforeDeepwater Horizon Disaster Professor Satish Nagarajaiah Dept. of Civil & Env. Eng. , Dept

  5. Vulnerability, Risk Management, and Agricultural Development

    E-Print Network [OSTI]

    Fafchamps, Marcel

    2009-01-01T23:59:59.000Z

    P. (1980). “Attitudes Towards Risk: Experimental MeasurementIncentive Flexibility, and Risk. ” Americal Journal ofCaria, A. S. (2009), Risk Attitudes and The Formation of

  6. UEA Water Security Research Centre Climate Change and Variability Adaptation and Vulnerability

    E-Print Network [OSTI]

    Everest, Graham R

    UEA Water Security Research Centre Climate Change and Variability · Adaptation and Vulnerability · Transboundary Cooperation ­ Conflict · Irrigation Performance and Policy · River Basin Management · Water Allocation · Hydropolitics www.uea.ac.uk/watersecurity #12;The UEA Water Security Research Centre applies

  7. Australia's Humanitarian Action Policy and Disaster Risk Reduction Policy

    E-Print Network [OSTI]

    Botea, Adi

    to get more information Disaster Risk Reduction Team Disaster Prevention and Risk Reduction Section GrantAustralia's Humanitarian Action Policy and Disaster Risk Reduction Policy A Commitment: · Disaster risk reduction is integrated into the Australian aid program · Capacity of partner governments

  8. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01T23:59:59.000Z

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  9. Uncovering the factors that can support and impede post-disaster EIA practice in developing countries: The case of Aceh Province, Indonesia

    SciTech Connect (OSTI)

    Gore, Tom; Fischer, Thomas B., E-mail: fischer@liverpool.ac.uk

    2014-01-15T23:59:59.000Z

    The close relationship between environmental degradation and the occurrence and severity of disaster events has in recent years raised the profile of environmental assessment (EA) in the disaster management field. EA has been identified as a potentially supportive tool in the global effort to reduce disaster risk. As a component of this, attention has been brought specifically to the importance of the application of EA in the aftermath of disaster events in order to help prevent recurrence and promote sustainability. At the same time, however, it has also been recognised that post-disaster environments may be unfavourable to such practices. Looking at the practice of environmental impact assessment (EIA), this paper reports on a study which sought to identify more specifically the factors which can both support and hinder such practice following disaster events in a developing country context. Analysing the situation in Aceh Province, Indonesia, after the impact of two tsunamigenic earthquakes in late 2004 and early 2005, it is concluded that if EIA is to have a central role in the post-disaster period, pre-disaster preparation could be a key. -- Highlights: • Close relationship between environmental degradation and occurrence/severity of disaster events has raised profile of EA. • EA as a potentially supportive tool in the global effort to reduce disaster risk • Application of EA in the aftermath of disaster events to help prevent recurrence and promote sustainability • The paper looks at factors which can both support and hinder EA following disaster events in a developing country context. • We analyse the situation in Aceh Province, Indonesia, after the impact of two tsunamigenic earthquakes in 2004 and 2005.

  10. Obtaining Disaster Assistance for Farms and Ranches

    E-Print Network [OSTI]

    Lovell, Ashley; Outlaw, Joe

    2005-10-11T23:59:59.000Z

    Agricultural producers in counties declared disaster areas may apply for assistance from the Farm Services Agency and the Texas Department of Agriculture. This leaflet explains the programs available and how to apply....

  11. Returning Home After a Disaster: Supply List

    E-Print Network [OSTI]

    Norman, Lisa

    2005-09-30T23:59:59.000Z

    When you return home after a disaster, you will want to have sturdy shoes, proper tools, clothes and medications for several days, and a first-aid kit. This publication also includes a list of necessary cleaning supplies....

  12. Modeling Dynamics of Post Disaster Recovery

    E-Print Network [OSTI]

    Nejat, Ali

    2012-10-19T23:59:59.000Z

    Natural disasters result in loss of lives, damage to built facilities, and interruption of businesses. The losses are not instantaneous rather they continue to occur until the community is restored to a functional socio-economic entity. Hence...

  13. Obtaining Disaster Assistance for Public Infrastructure

    E-Print Network [OSTI]

    Taylor, Greg

    2005-10-10T23:59:59.000Z

    County and municipal governments, as well as certain private non-profit organizations, may qualify for assistance in rebuilding public infrastructure after a natural disaster. This leaflet details the assistance programs available from the Federal...

  14. Modeling Dynamics of Post Disaster Recovery 

    E-Print Network [OSTI]

    Nejat, Ali

    2012-10-19T23:59:59.000Z

    Natural disasters result in loss of lives, damage to built facilities, and interruption of businesses. The losses are not instantaneous rather they continue to occur until the community is restored to a functional ...

  15. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  16. Do Disaster Expectations Explain Household Portfolios?

    E-Print Network [OSTI]

    Alan, Sule

    durable ex- penditure information; and ?nally, the Panel Study of Income Dynamics (1983-1994) that allows me to calibrate group speci?c income process parameters. Limited het- 3 erogeneity in all parameters is allowed for by estimating the structural... innovations to excess return to be correlated with innovations to per- manent or transitory income in normal market times. Allowing for such a correlation is straightforward and would reduce the ex-ante disaster probability and disaster size needed to match...

  17. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  18. Disaster and social vulnerability: The case of undocumented Mexican migrant workers 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    Nav sensor adds realism to the simulated relative navigation measurements. The docking controller's performance is evaluated in the presence of measurement noise, with the cases of sensor noise only, vehicle mass errors plus sensor noise, errors in vehicle...

  19. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Office of Environmental Management (EM)

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  20. School Disaster Needs for Students with Disabilities: Voices from the Field

    E-Print Network [OSTI]

    Barnes, Jill M.

    2013-01-01T23:59:59.000Z

    10 School Disaster Planning ………………………………………………………. ……… 15about Knowledge of School Disaster Preparedness … 59STEPS, Los Angeles Unified School District. Borum, R. ,

  1. Program plan for the partnership for natural disaster reduction. Rev 0

    SciTech Connect (OSTI)

    NONE

    1998-02-01T23:59:59.000Z

    In a matter of minutes, a natural disaster completely changes people`s lives. For example, 9,750 lives were lost in the 1993 Latur, India earthquake, 106,000 homes were destroyed in the 1995 Hanshin-Awajii (Kobe) Japan earthquake, and over 8000 jobs/businesses were either disrupted or terminated during Hurricane Andrew. Worldwide, economic disaster damages have tripled in the past 30 years - rising from $40 billion in the 1960`s to $120 billion in the 1980`s. Potential losses and recovery costs continue to rise because of rapid population growth, urban expansion, and increased new construction concentrated in high-risk areas. In the U.S., economic losses from 1989 to 1994 resulting from hurricanes and earthquakes exceeded more than $100 billion. With the exception of floods, severe windstorms annually cause more damage than earthquakes because they occur more frequently. On average, 350 lives are lost every year as a result of windstorms. Over the last decade, nearly 90% of the property losses have resulted from windstorms and about 4% from earthquakes. The unexpected vulnerability of many homes, the high number of pay-outs by insurance companies, and the resulting difficulties of getting affordable insurance coverage following Hurricane Andrew in Florida further emphasized the need for the United States to aggressively put more efforts into wind-related pre-disaster mitigation. Everyone shares the burden of recovery in the form of increased taxes for federal assistance and higher insurance premiums. In response to these critical national and international needs, the Partnership for Natural Disaster Reduction is defining a national program which has the mission to develop, validate, and implement technologies that will reduce damage to structures, buildings, and infrastructure elements resulting from windstorms, earthquakes, and aging processes.

  2. attack disaster preparedness: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and other disaster-specific information. The app is free to download 12 Climate change in the Western Cape : a disaster risk assessment of the impact on human health. Open...

  3. UNEP MOOC Disasters and Ecosystems: Resilience in a Changing Climate

    Broader source: Energy.gov [DOE]

    The United Nations Environment Programme (UNEP) is launching the first Massive Open Online Course (MOOC) on Disasters and Ecosystems, which features ecosystem-based solutions for disaster risk reduction and climate change adaptation, case studies, guest speakers, etc.

  4. Patents to the Rescue - Disasters and Patent Law

    E-Print Network [OSTI]

    Torrance, Andrew W.

    2007-01-01T23:59:59.000Z

    The patent system can play a vital role in preparing for, mitigating, reacting to, and preventing disasters. In the far term, it ensures that society continually improves its technological capacity to deal with disasters. In the near term...

  5. Disasters and the Law: The Legal Implications of Hurricane Katrina

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Law 224.9 Disasters and the Law: The Legal Implications of Hurricane Katrina (Spring 2006) Units: 3 Time: Mondays 3:20-6:00 Course Description: Recent hurricanes and other natural disasters demonstrate An Unnatural Disaster: The Aftermath of Hurricane Katrina. This report, spearheaded by University of Texas law

  6. Nuclear Catastrophe, Disaster-Related Environmental Injustice, and Fukushima, Japan

    E-Print Network [OSTI]

    Shrader-Frechette, Kristin

    Nuclear Catastrophe, Disaster-Related Environmental Injustice, and Fukushima, Japan: Prima the 2011 Japanese Fukushima-Daiichi nuclear disaster (FD) as a preliminary case study-- despite the limits Fukushima-Daiichi (FD) nuclear accident to explain disaster-related environmental injustice (DREI

  7. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01T23:59:59.000Z

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  8. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27T23:59:59.000Z

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  9. A longitudinal study of emerging networks during natural disaster

    E-Print Network [OSTI]

    Abbasi, Alireza; Kapucu, Naim

    2015-01-01T23:59:59.000Z

    We present longitudinal analysis of the evolution of inter-organizational disaster coordination networks during natural disasters. We suggest that social networks are a useful paradigm for exploring this complex phenomenon from both theoretical and methodological perspective aiming to develop a quantitative assessment framework which could aid in developing a better understanding of the optimal functioning of these emerging inter-organizational networks during natural disasters. We highlight the importance of network metrics in order to investigate disaster response coordination networks. Results suggest that in disasters, rate of communication increases and creates the conditions where organizational structures need to move at that same pace to exchange new information.

  10. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy...

  11. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01T23:59:59.000Z

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  12. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

  13. Japan's Triple Disaster The Continuing News Story

    E-Print Network [OSTI]

    Napp, Nils

    Japan's Triple Disaster The Continuing News Story Dennis Normile Japan News Bureau Chief November not pragmatic." -Fumihiko Imamura #12;18 News Of The Week Does Japan Need Nuclear Power? #12;19 News & Analysis "People lost trust in TEPCO and the energy policy itself." -Shunsuke Managi #12;20 News Of The Week Japan

  14. Disaster Resiliency and Recovery: Capabilities (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-11-01T23:59:59.000Z

    The National Renewable Energy Laboratory (NREL) is the nation's leader in energy efficient and renewable energy technologies, practices, and strategies. For the last 15 years, NREL has provided expertise, tools, and innovations to private industry; federal, state, and local governments; non-profit organizations; and communities during the planning, recovery, and rebuilding stages after disaster strikes.

  15. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  16. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01T23:59:59.000Z

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  17. Detecting Network Vulnerabilities Through Graph Theoretical Methods

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

  18. SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

  19. Disaster Response Team FAST Skills Training with a PortableUltrasound Simulator Compared to Traditional Training: Pilot Study

    E-Print Network [OSTI]

    Paddock, Michael T.; Bailitz, John; Horowitz, Russ; Khishfe, Basem; Cosby, Karen; Sergel, Michelle J.

    2015-01-01T23:59:59.000Z

    et al. Disaster Response Team FAST Skills Training ConflictsR esearch Disaster Response Team FAST Skills Training with aremotely by disaster response team members, traditional live

  20. Disaster: would your community bounce back?

    SciTech Connect (OSTI)

    Sims, Benjamin H [Los Alamos National Laboratory

    2011-01-12T23:59:59.000Z

    What makes some communities or organizations able to quickly bounce back from a disaster, while others take a long time to recover? This question has become very important for emergency planners in federal, state, and local government - particularly since the 9/11 attacks and Hurricane Katrina, which nearly destroyed New Orleans five years ago. These events have made people aware that we can't always prevent disasters, but might be able to improve the ability of communities and regions to respond to and bounce back from major disruptions. Social scientists have found that most communities are, in fact, quite resilient to most disasters. People tend to work together, overcome divisions, identify problems, and develop improvised solutions. This often leads to a greater sense of community and a sense of personal accomplishment. Long-term recovery can be harder, but rebuilding can create jobs and stimulate economies. Communities may even end up better than they were before. But there are some disturbing exceptions to this trend, including Hurricane Katrina. The hurricane killed many people, the federal and local emergency response was not effective, people who could not evacuate were housed in the Superdome and Convention Center in terrible conditions, crime was prevalent, and local government did not appear to have control over the situation. A significant portion of the population was eventually evacuated to other cities. Even five years later, many people have not returned, and large parts of the city have not been rebuilt. Clearly, New Orleans lacked sufficient resilience to overcome a disaster of the magnitude of Katrina. There are four factors that social scientists are beginning to agree are important for community resilience: (1) A strong, diverse economy - Stable jobs, good incomes, diversity of industries, personal savings; (2) Robust social networks - Community members know each other, help each other, and have connections outside the community; (3) Competent organizations - Government, health care, community service, and religious organizations are competent and trustworthy, and have resources to handle community needs; and (4) High-quality infrastructure - Road, power, and water systems (etc.) are in good condition and are designed to provide service even if some connections are destroyed. To explore how these factors make communities resilient, I will tell two stories of disasters. The first is the Buffalo Creek flood, which wiped out a coal mining community in West Virginia in 1972. This is a classic example of community that was not resilient in the aftermath of a disaster. The second example is the Vietnamese immigrant community in the Versailles neighborhood of New Orleans. In spite of being relatively poor and culturally isolated, this community was one of the first to fully rebound following Hurricane Katrina.

  1. Policy Network Approach to Coordinated Disaster Response

    E-Print Network [OSTI]

    Kim, Kwang Deok

    2013-01-01T23:59:59.000Z

    In this paper, we explore the formation of network relationships among disaster relief agencies during the process of responding to an unexpected event. The relationship is investigated through variables derived from the policy network theory, and four cases from three developed countries such as (i) Hurricane Katrina in the US; (ii) Typhoon Maemi in South Korea; (iii) Kobe; and, (iv) Tohoku Earthquake in Japan that failed to cope with extreme events forms the basis for case study presented here. We argue that structural characteristics of multi-jurisdictional coordination may facilitate or impede in responding to a complex nature of recent disaster. We further highlight the promise of policy network approach in facilitating the development of multi-jurisdictional coordination process which may provide new avenue to improve the communication and coordination of hierarchical command control driven organizations with the local community. Our proposed novel approach in investigating the usefulness of network app...

  2. Needs for Robotic Assessments of Nuclear Disasters

    SciTech Connect (OSTI)

    Victor Walker; Derek Wadsworth

    2012-06-01T23:59:59.000Z

    Following the nuclear disaster at the Fukushima nuclear reactor plant in Japan, the need for systems which can assist in dynamic high-radiation environments such as nuclear incidents has become more apparent. The INL participated in delivering robotic technologies to Japan and has identified key components which are needed for success and obstacles to their deployment. In addition, we are proposing new work and methods to improve assessments and reactions to such events in the future. Robotics needs in disaster situations include phases such as: Assessment, Remediation, and Recovery Our particular interest is in the initial assessment activities. In assessment we need collection of environmental parameters, determination of conditions, and physical sample collection. Each phase would require key tools and efforts to develop. This includes study of necessary sensors and their deployment methods, the effects of radiation on sensors and deployment, and the development of training and execution systems.

  3. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  4. FEMA Emergency Management Performance Grant Program | Department...

    Energy Savers [EERE]

    for all hazards, as authorized by Section 662 of the Post Katrina Emergency Management Reform Act (6 U.S.C. sect. 762) and the Robert T. Stafford Disaster Relief and Emergency...

  5. attitudes perceived vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Summary: BIODIVERSITY RESEARCH Assessing species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner-...

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Energy Savers [EERE]

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  7. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  8. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Energy Savers [EERE]

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  9. aquifer contamination vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

  10. V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

  11. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier, E-mail: jjtoroca@unal.edu.co [Institute of Environmental Studies, National University of Colombia, Bogota (Colombia); Duarte, Oscar, E-mail: ogduartev@unal.edu.co [Department of Electrical and Electronics Engineering, National University of Colombia, Bogota (Colombia); Requena, Ignacio, E-mail: requena@decsai.ugr.es [Department of Computer Science and Artificial Intelligence, University of Granada (Spain); Zamorano, Montserrat, E-mail: zamorano@ugr.es [Department of Civil Engineering, University of Granada (Spain)

    2012-01-15T23:59:59.000Z

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  12. Crowd Disasters as Systemic Failures: Analysis of the Love Parade Disaster

    E-Print Network [OSTI]

    Dirk Helbing; Pratik Mukerji

    2012-06-25T23:59:59.000Z

    Each year, crowd disasters happen in different areas of the world. How and why do such disasters happen? Are the fatalities caused by relentless behavior of people or a psychological state of panic that makes the crowd 'go mad'? Or are they a tragic consequence of a breakdown of coordination? These and other questions are addressed, based on a qualitative analysis of publicly available videos and materials, which document the planning and organization of the Love Parade in Duisburg, Germany, and the crowd disaster on July 24, 2010. Our analysis reveals a number of misunderstandings that have widely spread. We also provide a new perspective on concepts such as 'intentional pushing', 'mass panic', 'stampede', and 'crowd crushs'. The focus of our analysis is on the contributing causal factors and their mutual interdependencies, not on legal issues or the judgment of personal or institutional responsibilities. Video recordings show that, in Duisburg, people stumbled and piled up due to a 'domino effect', resulting from a phenomenon called 'crowd turbulence' or 'crowd quake'. Crowd quakes are a typical reason for crowd disasters, to be distinguished from crowd disasters resulting from 'panic stampedes' or 'crowd crushes'. In Duisburg, crowd turbulence was the consequence of amplifying feedback and cascading effects, which are typical for systemic instabilities. Accordingly, things can go terribly wrong in spite of no bad intentions from anyone. Comparing the incident in Duisburg with others, we give recommendations to help prevent future crowd disasters. In particular, we introduce a new scale to assess the criticality of conditions in the crowd. This may allow preventative measures to be taken earlier on. Furthermore, we discuss the merits and limitations of citizen science for public investigation, considering that today, almost every event is recorded and reflected in the World Wide Web.

  13. Disaster Response and Recovery Webinar | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Department of Health and Human Services to evaluate, assess, and mitigate the impacts of climate change on their disaster recovery and response programs. Under the Stafford Act,...

  14. Problems and Solutions: Training Disaster Organizations of the...

    Office of Environmental Management (EM)

    Soft Costs Author Florida Solar Energy Center j-fsec-pf-371-03.pdf More Documents & Publications Florida's Emergency Shelters Go Solar Disasters: Photovoltaics for Special Needs...

  15. Data-driven resource allocation decisions : FEMA's disaster recovery centers

    E-Print Network [OSTI]

    Moline, Julia N. (Julia Nessa)

    2014-01-01T23:59:59.000Z

    Resource allocation decisions in post-disaster operations are challenging because of situational dynamics, insufficient information, organizational culture, political context, and urgency. We propose a methodology to create ...

  16. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions as the major theme. #12;Interdisciplinary Impact of Networks Networks Energy Manufacturing Telecommunications

  17. Structural Vulnerability Assessment of Electric Power Grids

    E-Print Network [OSTI]

    Koç, Yakup; Kooij, Robert E; Brazier, Frances M T

    2013-01-01T23:59:59.000Z

    Cascading failures are the typical reasons of black- outs in power grids. The grid topology plays an important role in determining the dynamics of cascading failures in power grids. Measures for vulnerability analysis are crucial to assure a higher level of robustness of power grids. Metrics from Complex Networks are widely used to investigate the grid vulnerability. Yet, these purely topological metrics fail to capture the real behaviour of power grids. This paper proposes a metric, the effective graph resistance, as a vulnerability measure to de- termine the critical components in a power grid. Differently than the existing purely topological measures, the effective graph resistance accounts for the electrical properties of power grids such as power flow allocation according to Kirchoff laws. To demonstrate the applicability of the effective graph resistance, a quantitative vulnerability assessment of the IEEE 118 buses power system is performed. The simulation results verify the effectiveness of the effect...

  18. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  19. Cancer Vulnerabilities Unveiled by Genomic Loss

    E-Print Network [OSTI]

    Nijhawan, Deepak

    Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

  20. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Broader source: Energy.gov (indexed) [DOE]

    Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...

  1. National Disaster Resilience Competition Webinar Series: Long-Term Commitment Factor

    Broader source: Energy.gov [DOE]

    The U.S. Department of Housing and Urban Development (HUD) is hosting the National Disaster Resilience Competition Webinar Series to foster awareness about the National Disaster Resilience...

  2. Emotions in Crisis Management: An Analysis of the Organizational Response

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Emotions in Crisis Management: An Analysis of the Organizational Response to Two Natural Disasters of the Organizational Response to Two Natural Disasters Abstract The impact of emotions on organizational performance implications for understanding organizational response to sudden onset events with potentially catastrophic

  3. Becoming Resilient: Disaster Planning and Recovery: NREL Experts Assist Before and After a Disaster (Fact Sheet)

    SciTech Connect (OSTI)

    Hotchkiss, E.

    2014-08-01T23:59:59.000Z

    This fact sheet provides information on how private industry; federal, state, and local governments; non-profit organizations; and communities can utilize NREL's expertise, tools, and innovations to incorporate energy efficiency and renewable energy into the planning, recovery, and rebuilding stages of disaster.

  4. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  5. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  6. Disaster Unemployment Assistance (DUA) Due to Effects of Hurricane Sandy

    E-Print Network [OSTI]

    Brinkmann, Peter

    Disaster Unemployment Assistance (DUA) Due to Effects of Hurricane Sandy Factsheet Have you lost work or income due to the effects of Hurricane Sandy? If so, you may be eligible for Disaster due to the effects of hurricane sandy, you may qualify for DUA. there are different eligibility

  7. Disaster Recovery in Wireless Networks: A Homology-Based Algorithm

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Disaster Recovery in Wireless Networks: A Homology-Based Algorithm A. Vergne, I. Flint, L of wireless networks after a disaster. Considering a damaged wireless network, presenting coverage holes or cover problem. I. INTRODUCTION Wireless networks are present everywhere, must it be sensor networks

  8. Homology based algorithm for disaster recovery in wireless networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Homology based algorithm for disaster recovery in wireless networks A. Vergne, I. Flint, L for disaster recovery of wireless networks. We consider a damaged wireless network presenting coverage holes the performances between each other and with known methods. I. INTRODUCTION Wireless networks are present

  9. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  10. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  11. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  12. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Broader source: Energy.gov (indexed) [DOE]

    or update to version 7.2.1.4 Addthis Related Articles V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity...

  13. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified...

  14. Probabilistic Management of Slope Disaster Detection Systems for

    E-Print Network [OSTI]

    Hespanha, João Pedro

    will be sent to a base station through wireless interactions between the nodes, and each sensor node can also with lithium-ion batteries and is expected to work for more than two years. However, the running life is still

  15. These lives will not be lost in vain: organizational learning from disaster in US coal mining

    SciTech Connect (OSTI)

    Madsen, P.M. [Brigham Young University, Provo, UT (United States). Marriott School Management

    2009-09-15T23:59:59.000Z

    The stated purpose of the investigations that invariably follow industrial, transportation, and mining disasters is to learn from those tragedies to prevent future tragedies. But does prior experience with disaster make organizations more capable of preventing future disasters? Do organizations learn from disasters experienced by other organizations? Do organizations learn differently from rare disasters than they do from common minor accidents? In its present state, the organizational safety literature is poorly equipped to answer these questions. The present work begins to address this gap by empirically examining how prior organizational experience with disaster affects the likelihood that organizations will experience future disasters. It approaches the issue in the context of fatal U.S. coal mining accidents from 1983 to 2006. The analysis demonstrates that organizations do learn to prevent future disasters through both direct and vicarious experience with disaster. It also indicates that the mechanisms through which organizations learn from disasters differ from those through which they learn from minor accidents.

  16. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  17. Bluetooth Vulnerabilities ECE 478 Winter 05

    E-Print Network [OSTI]

    Bluetooth Vulnerabilities ECE 478 Winter 05 Victor Yee #12;Topics · What is Bluetooth? · History ­ Automobiles #12;What is Bluetooth? · Short-range (10m-100m) wireless specification · Operating at 2.4GHz radio 2Mb/s #12;History · Named from Danish King Harold Bluetooth from the 10th century ­ instrumental

  18. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  19. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  20. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  1. Healthcare MBA Prepare to Find Healthcare Management Solutions

    E-Print Network [OSTI]

    Vertes, Akos

    .5 Macroeconomics for the Global Economy 1.5 International Management 1.5 Management of Information Systems 1 and Healthcare 1.5 Disaster Management in Healthcare Organizations 1.5 Quality and Performance Improvement 1Healthcare MBA onLine #12;Prepare to Find Healthcare Management Solutions Healthcare is changing

  2. PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Hultman, Nathan E.

    PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE A Quantitative Approach R. H. Moss A. L. Brenkert E@ntis.fedworld.gov Online ordering: http://www.ntis.gov/ordering.htm #12;iii EXECUTIVE SUMMARY The PNNL Vulnerability

  3. Empirical Estimates and Observations of 0Day Vulnerabilities

    SciTech Connect (OSTI)

    Miles A. McQueen; Trevor A. McQueen; Wayne F. Boyer; May R. Chaffin

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to a system from exploit of vulnerabilities which are not generally known to the public or, most importantly, to the owners of the system. Using the 0Day definition given above, we analyzed the 0Day lifespans of 491 vulnerabilities and conservatively estimated that in the worst year there were on average 2500 0Day vulnerabilities in existence on any given day. Then using a small but intriguing set of 15 0Day vulnerability lifespans representing the time from actual discovery to public disclosure, we made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day vulnerabilities in existence on any given day.

  4. DECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL

    E-Print Network [OSTI]

    Wang, Hai

    , telecommunications, water supply, wastewater, electric power and other energy infrastructure. Event databasesDECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL INFRASTRUCTURE Zimmerman, R interdependencies, extreme events, vulnerability assessment 1 Introduction The provision of infrastructure services

  5. Cyber Vulnerability Disclosure Policies for the Department of Electrical and

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber Vulnerability Disclosure Policies for the Smart Grid Adam Hahn Department of Electrical ATTRIBUTES The "Vulnerability Disclosure Framework" developed by the National Infrastructure Advisory Council Department of Electrical and Computer Engineering Iowa State University Ames, IA 50011 Email: gmani

  6. Vulnerability assessment of water supply systems for insufficient fire flows

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15T23:59:59.000Z

    supply systems are vulnerable to many forms of terrorist acts, most of the vulnerability analysis studies on these systems have been for chemical and biological threats. Because of the interdependency of water supply infrastructure and emergency fire...

  7. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  8. Lights, camera, emergency : preemptive planning for disaster relief

    E-Print Network [OSTI]

    Weiss, Erica A

    2010-01-01T23:59:59.000Z

    With increasing frequency and accuracy, the prediction of natural disasters and their effects are being charted. Their impendence is a certainty and yet we ignore the warnings, the lessons of the past, and the prominence ...

  9. Leading a lean transformation in the wake of a disaster

    E-Print Network [OSTI]

    Caballero, Christian G. (Christian Gabriel)

    2005-01-01T23:59:59.000Z

    Through a disaster, a company is presented with an opportunity to leverage the momentum from recovery efforts to drastically change the way business is conducted. In the case of Raytheon's Solid State Microwave division, ...

  10. Community isolation and disaster recovery: the case of two colonias

    E-Print Network [OSTI]

    Kamel, Nabil Mohsen Osman

    1993-01-01T23:59:59.000Z

    COMMUNITY ISOLATION AND DISASTER RECOVERY: THE CASE OF TWO COLONIAS A Thesis by NABIL MOHSEN OSMAN ~ Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF URBAN PLANNING Deceinber 1993... Major Subject: Urban and Regional Planning COMMUNITY ISOLATION AND DISASTER RECOVERY: THE CASE OF TWO COLONIAS A Thesis by NABIL MOHSEN OSMAN KAMEL Submitted to Texas AkM University in partial fulfillment of the requirements for the degree...

  11. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  12. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  13. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy| Department

  14. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac

  15. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment

  16. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment of

  17. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment| Department of

  18. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|

  19. Running Head: Ecosystem Energy and Conservation1 Ecosystem Energy as a Framework for Prioritizing Conservation Vulnerabilities and3

    E-Print Network [OSTI]

    Hansen, Andrew J.

    1 Running Head: Ecosystem Energy and Conservation1 2 Ecosystem Energy as a Framework for Prioritizing Conservation Vulnerabilities and3 Management Strategies4 5 Andrew James Hansen6 Ecology property, ecosystem energy levels, which,14 while once widely recognized as important, has received little

  20. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01T23:59:59.000Z

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  1. The application of Intelligent Transportation Systems (ITS) and Information Technology systems to disaster response

    E-Print Network [OSTI]

    Pinelis, Lev

    2006-01-01T23:59:59.000Z

    Disaster response operations during recent terrorist attacks and natural disasters have been a cause for concern. Lack of planning is one source of difficulties with these operations, but even if a perfect plan is agreed ...

  2. Rights-based evaluation of government responses to a given 'natural' disaster : Katrina as case study

    E-Print Network [OSTI]

    Haeffner, Melissa (Melissa Ann)

    2010-01-01T23:59:59.000Z

    Disaster impacts human mobility and a rights-based approach to disaster response is needed to protect the human rights of those who seek migration as an adaptation strategy. This paper deals with returning to a place after ...

  3. Emergency Medical Services Management (EMSM) is an online bachelor's degree that prepares emergency medical service providers for management, educational

    E-Print Network [OSTI]

    Vertes, Akos

    Operations Management in EHS Systems EHS 4111 Leadership Concepts in EHS EHS 4112 Special Operations & Disaster Management EHS 4144 Seminar in EHS Leadership HSCI 2103 Health Policy and the Health Care System HSCI 2104 Management of Health Science Services HSCI 2108 Quality Improvement in Health Care HSCI 2112W

  4. T-581: Novell Access Manager Java Double Literal Denial of Service...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability Report: Novell Access Manager 3.x Oracle FPUpdater Tool IMPACT ASSESSMENT: Medium Discussion: The Double.parseDouble method in Java Runtime Environment in Oracle...

  5. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  6. T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

  7. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  8. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04T23:59:59.000Z

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  9. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power...

  10. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  11. Antioch University and EPA Webinar: Assessing Vulnerability of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Webinar: Assessing Vulnerability of Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing...

  12. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  13. areas vulnerabilities impacts: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

  14. assessing infrastructure vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

  15. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Broader source: Energy.gov (indexed) [DOE]

    DMZs, the corporate network, and the outside. In an on-site assessment, while scanning for vulnerabilities on the CS network, the assessment team discovered IP addresses...

  16. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  17. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  18. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  19. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Belgium) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Belgium Coordinates...

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Czech Republic) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Czech Republic...

  1. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

  2. Adaptive management: a paradigm for remediation of public facilities

    SciTech Connect (OSTI)

    Janecky, David R [Los Alamos National Laboratory; Whicker, Jeffrey J [Los Alamos National Laboratory; Doerr, Ted B [NON LANL

    2009-01-01T23:59:59.000Z

    Public facility restoration planning traditionally focused on response to natural disasters and hazardous materials accidental releases. These plans now need to integrate response to terrorist actions. Therefore, plans must address a wide range of potential vulnerabilities. Similar types of broad remediation planning are needed for restoration of waste and hazardous material handling areas and facilities. There are strong similarities in damage results and remediation activities between unintentional and terrorist actions; however, the uncertainties associated with terrorist actions result in a re-evaluation of approaches to planning. Restoration of public facilities following a release of a hazardous material is inherently far more complex than in confined industrial settings and has many unique technical, economic, social, and political challenges. Therefore, they arguably involve a superset of drivers, concerns and public agencies compared to other restoration efforts. This superset of conditions increases complexity of interactions, reduces our knowledge of the initial conditions, and even condenses the timeline for restoration response. Therefore, evaluations of alternative restoration management approaches developed for responding to terrorist actions provide useful knowledge for large, complex waste management projects. Whereas present planning documents have substantial linearity in their organization, the 'adaptive management' paradigm provides a constructive parallel operations paradigm for restoration of facilities that anticipates and plans for uncertainty, multiple/simUltaneous public agency actions, and stakeholder participation. Adaptive management grew out of the need to manage and restore natural resources in highly complex and changing environments with limited knowledge about causal relationships and responses to restoration actions. Similarities between natural resource management and restoration of a facility and surrounding area(s) after a disruptive event suggest numerous advantages over preset linearly-structured plans by incorporating the flexibility and overlap of processes inherent in effective facility restoration. We discuss three restoration case studies (e.g., the Hart Senate Office Building anthrax restoration, Rocky Flats actinide remediation, and hurricane destruction restoration), that implement aspects of adaptive management but not a formal approach. We propose that more formal adoption of adaptive management principles could be a basis for more flexible standards to improve site-specific remediation plans under conditions of high uncertainty.

  3. Natural Disaster Survey Report Ft. Smith and Van Buren, Arkansas,

    E-Print Network [OSTI]

    and conversations with volunteer amateur radio operators, members of the print and broadcast media in Ft. Smith to the U.S. Congress, to local government officials in Ft. Smith and Van Buren, and to the media on May 21Natural Disaster Survey Report Ft. Smith and Van Buren, Arkansas, Tornado of April 21, 1996 U

  4. Water is Vital--Especially after a Disaster (Spanish)

    E-Print Network [OSTI]

    Crocker, Andrew

    2007-10-08T23:59:59.000Z

    Dehydration can be a serious threat after a disaster, when supplies of clean drinking water may be limited. Learn how you can find and use hidden sources of water in your home and purify water to make it safe for drinking....

  5. Rochester's plan to downgrade mathematics: a recipe for disaster?

    E-Print Network [OSTI]

    Mar 1, 1996 ... U. of Rochester Plan to Cut Mathematics Is Recipe for Disaster ... Four graduate programs are to be terminated: mathematics, chemical engineering, comparative ... chemists, computer scientists, economists, physicists, and others. ... in their fields increasingly depend on sophisticated mathematical methods, ...

  6. Water is Vital--Especially after a Disaster 

    E-Print Network [OSTI]

    Crocker, Andrew

    2005-10-10T23:59:59.000Z

    Dehydration can be a serious threat after a disaster, when supplies of clean drinking water may be limited. Learn how you can find and use hidden sources of water in your home and purify water to make it safe for drinking....

  7. HazardsandDisastersTools,TechniquesandPolicyImplications_ Project Description

    E-Print Network [OSTI]

    Fernandez, Eduardo

    Welsh, Staci Zavatarro Catastrophic hurricane disasters such as Andrew and Katrina highlighted dilemmas to Catastrophic Hurricanes Assessing Potential Magnitude and Policy Implications for Housing and Land Development; created a Hurricane Exposure Probability metric derived using hurricane tracks for the period 1851

  8. Mountain Lake Biological Station University of Virginia DISASTER PLAN

    E-Print Network [OSTI]

    Brodie III, Edmund D.

    . For all NON-EMERGENCY Disasters (minor accident, electrical failure, etc.) contact any MLBS staff member, lightning strikes, and power outages in and around the station. If a storm is approaching, take shelter immediately, secure doors and windows, and shutdown or unplug non-essential electrical equipment

  9. Water is Vital--Especially after a Disaster

    E-Print Network [OSTI]

    Crocker, Andrew

    2005-10-10T23:59:59.000Z

    Dehydration can be a serious threat after a disaster, when supplies of clean drinking water may be limited. Learn how you can find and use hidden sources of water in your home and purify water to make it safe for drinking....

  10. Data Mining Disasters: a report Mary McGlohon

    E-Print Network [OSTI]

    , and an associated risk of voting fraud. This work surveys a number of data mining disasters and pro- poses several is a significant problem in machine learn- ing programming. In 2007, numeric floods caused over $600 million in property damages [1], and a loss of several thou- sand nerd-hours of work.1 A lack of response fromthe Pro

  11. Global Warming Time Bomb:* Actions Needed to Avert Disaster

    E-Print Network [OSTI]

    Hansen, James E.

    Global Warming Time Bomb:* Actions Needed to Avert Disaster James Hansen 26 October 2009 Club statements relating to policy are personal opinion Global Warming Status 1. Knowledge Gap Between - What Benefits of Solution Despite the publicity that global warming has received, there is a large gap between

  12. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14T23:59:59.000Z

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  13. Importance-Scanning Worm Using Vulnerable-Host Distribution

    E-Print Network [OSTI]

    Ji, Chuanyi

    Importance-Scanning Worm Using Vulnerable-Host Distribution Zesheng Chen School of Electrical scanning. The distribution of vulnerable hosts on the Internet, however, is highly non- uniform over the IP-address space. This implies that random scanning wastes many scans on invulnerable addresses, and more virulent

  14. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  15. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  16. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01T23:59:59.000Z

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  17. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    of California. This paper describes the development and results from an integrated water resource management application includes management of reservoirs, run-of-river hydropower plants, water supply demand locations. Reservoir operations adapt to capture earlier and greater runoff volumes that result from earlier

  18. D I S A S T E R R I S K M A N A G E M E N T S E R I E S

    E-Print Network [OSTI]

    , Vulnerability, and the Global Economy 3 Charlotte Benson and Edward Clay 2. Natural Hazard Risk xi Editors' Note xiv Part I Globalization and the Economic Impacts of Disasters 1. Disasters. Globalization and Natural Disasters: An Integrative Risk Management Approach 57 Torben Juul Andersen 5. Urban

  19. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  20. 4 ARE YOU READY? FEDERAL EMERGENCY MANAGEMENT AGENCY

    E-Print Network [OSTI]

    Tullos, Desiree

    4 ARE YOU READY? FEDERAL EMERGENCY MANAGEMENT AGENCY Emergency Planning and Disaster Supplies if you have questions. #12;FEDERAL EMERGENCY MANAGEMENT AGENCY ARE YOU READY? 5 9. Take a first aid and when to shut off water, gas, and electricity at the main switches. Consult with your local utili- ties

  1. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

    2012-01-01T23:59:59.000Z

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  2. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10T23:59:59.000Z

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  3. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  4. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  5. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  6. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  7. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Hay, David

    Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks Pankaj K. Agarwal, swami}@cs.arizona.edu Electrical Engineering, Columbia University. {hdavid, gil}@ee.columbia.edu Abstract--Telecommunications networks heavily rely on the physical infrastructure and, are therefore

  8. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  9. Assessing node risk and vulnerability in epidemics on networks

    E-Print Network [OSTI]

    Rogers, Tim

    2015-01-01T23:59:59.000Z

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  10. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01T23:59:59.000Z

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  11. The Deepwater Horizon Disaster: What Happened and Why

    SciTech Connect (OSTI)

    Horne, Roland N. (Stanford University) [Stanford University

    2011-01-05T23:59:59.000Z

    The Deepwater Horizon disaster was the largest oil spill in US history, and the second largest spill in the world. 11 men lost their lives in the explosion and fire. Although the impacts of the spill were evident to large numbers of people, its causes were harder to see. This lecture will focus on the technical aspects of the events that led to the spill itself: what happened on the rig before, during and after the event, up to the time the rig sank. As with many engineering disasters, the accident was due to a sequence of failures, including both technical systems and procedural issues. Although the causes were complex and interacting, the lecture will focus on four main problems: (1) the failure of the cement and casing seal, (2) the failure to recognize and respond to hydrocarbon flow into the riser, (3) the ignition of hydrocarbons on the rig, and (4) the failure of the blow-out preventer (BOP) to seal the well. The lecture will conclude with some suggestions as to how events such as the Deepwater Horizon disaster can be avoided in the future. (Roland N. Horne is the Thomas Davies Barrow Professor of Earth Sciences at Stanford University, and was the Chairman of Petroleum Engineering from 1995 to 2006. He holds BE, PhD and DSc degrees from the University of Auckland, New Zealand, all in Engineering Science. Horne is a member of the U.S. National Academy of Engineering and is also an Honorary Member of the Society of Petroleum Engineers.)

  12. Can't figure out how to eat healthy during hurricane/disaster conditions? Under hurricane/disaster conditions, we often struggle with the question: What will I eat during

    E-Print Network [OSTI]

    Florida, University of

    1 of 18 #12;2 of 18 Foreword Can't figure out how to eat healthy during hurricane/disaster conditions? Under hurricane/disaster conditions, we often struggle with the question: What will I eat during hurricane/disaster conditions? This recipe book is your guide to making better food choices. We are all

  13. Geospatial Data Collection/Use in Disaster Response: A United States Nationwide

    E-Print Network [OSTI]

    Hodgson, Michael E.

    Geospatial Data Collection/Use in Disaster Response: A United States Nationwide Survey of State to provide assistance (in the form of monies, staff, geospatial data, etc.) to states when the disaster overwhelms the resources of the state. Geospatial support is one of the forms of assistance and a frequent

  14. ADJUSTING TO NATURAL DISASTERS Smith, V., Carbone, J., Hallstrom, D., Pope, J. & Darden, M.

    E-Print Network [OSTI]

    Wang, Hai

    the largest U.S. natural disaster on record, Hurricane Andrew, to evaluate how people and housing markets Hurricane Andrew, the largest U.S. natural disaster on record, to investigate two questions.1 We first most of the differences in demographic groups' patterns of adjustment to the hurricane damage. Low

  15. Rebuilding After Disaster: Going Green from the Ground Up (Revised) (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2009-10-01T23:59:59.000Z

    20-page "how-to" guide describing ways to turn a disaster into an opportunity to rebuild with greener energy technologies. It covers such topics as the importance of energy, options for communities, instructions for developing an energy plan, and other considerations. This guide is intended for the community leaders who have experienced a disaster.

  16. European biofuel plans could spell disaster -environmentalresearchweb A community website from IOP Publishing Sign in Forgotten your password? Sign

    E-Print Network [OSTI]

    European biofuel plans could spell disaster - environmentalresearchweb A community website from IOP. Corporate Partners Sustainable Futures Dec 17, 2007 European biofuel plans could spell disaster European Union plans to increase the use of biofuels could spell disaster for some of the world's poorest people

  17. Stop Blaming Disasters on Forces Beyond Our Control

    SciTech Connect (OSTI)

    Matalucci, R.V.

    1999-04-09T23:59:59.000Z

    As we enter the new millennium, let us recognize that the losses resulting from natural or malevolent events that cause major property damage, severe injuries, and unnecessary death are not always due to forces beyond our control. We can prevent these losses by changing the way we think and act about design and construction projects. New tools, technologies, and techniques can improve structural safety, security, and reliability and protect owners, occupants, and users against loss and casualties. Hurricane Mitch, the African embassy bombings, the ice storms in Canada and the northeastern US last winter, the Oklahoma City bombing, flooding and earthquakes in California, tornadoes and flooding in Florida, and wildfires in the Southwest are threats to the safety and security of the public and the reliability of our constructed environment. Today's engineering design community must recognize these threats and address them in our standards, building codes, and designs. We know that disasters will continue to strike and we must reduce their impact on the public. We must demand and create innovative solutions that assure a higher level of structural performance when disasters strike.

  18. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  19. About the relevance ofthe concept of risk acceptability in the risk analysis and risk management process: A decisional

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    About the relevance ofthe concept of« risk acceptability » in the risk analysis and risk management analysis and risk management are taken. This can be introduced by: ft) giving an image ofwhat are involved and participate to the risk management process. In France, the Toulouse disaster has revealed

  20. T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability |PROBLEM:

  1. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergyDepartment

  2. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    SciTech Connect (OSTI)

    Kvaerner, Jens [Bioforsk-Norwegian Institute for Agricultural and Environmental Research, Soil and Environmental Division, Frederik A. Dahls vei 20, N-1432 As (Norway)]. E-mail: jens.kvarner@bioforsk.no; Swensen, Grete [NIKU, Norwegian Institute for Cultural Heritage Research, Storgata 2, P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: grete.swensen@niku.no; Erikstad, Lars [NINA, Norwegian Institute for Nature Research, Dronningens gt. 13., P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: lars.erikstad@nina.no

    2006-07-15T23:59:59.000Z

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended.

  3. Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability 

    E-Print Network [OSTI]

    Crossley, Janet Ruth

    2008-01-01T23:59:59.000Z

    needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

  4. DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ

    E-Print Network [OSTI]

    Smith, Sean W.

    Chapter 1 DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ Rebecca Shapiro, Sergey Bratus, for SCADA software used in critical infrastructure, the widespread use of propri- etary protocols makes't apply in real-world infrastructure such as power SCADA. Domain experts often do not have the time

  5. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  6. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  7. Vulnerability of Hydropower Projects to Climate Change Revision: 20th

    E-Print Network [OSTI]

    Harrison, Gareth

    Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

  8. Cyber-Vulnerability of Power Grid Monitoring and Control Systems

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber-Vulnerability of Power Grid Monitoring and Control Systems Chee-Wooi Ten Iowa State, and power infrastructures due to the complexity of required compliances [5]. Although the complex outages. Three modes of malicious attacks on the power infrastructure are (i) attack upon the system, (ii

  9. Vulnerability Analysis of Complex Networks from Transportation Networks to

    E-Print Network [OSTI]

    Nagurney, Anna

    and Electric Power Supply Chains Anna Nagurney John F. Smith Memorial Professor Department of Finance to Dynamic Networks · Where Are We Now? An Empirical Case Study to Real-World Electric Power Supply ChainsVulnerability Analysis of Complex Networks from Transportation Networks to the Internet

  10. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01T23:59:59.000Z

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  11. Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability

    E-Print Network [OSTI]

    Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

  12. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

  13. An assessment of fire vulnerability for aged electrical relays

    SciTech Connect (OSTI)

    Vigil, R.A. [Sandia National Labs., Albuquerque, NM (United States)]|[Science and Engineering Associates, Inc., Albuquerque, NM (United States); Nowlen, S.P. [Sandia National Labs., Albuquerque, NM (United States)

    1995-03-01T23:59:59.000Z

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized.

  14. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  15. A case study of social vulnerability mapping: issues of scale and aggregation

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15T23:59:59.000Z

    This study uses geographic information systems to determine if the aggregation of census block data are better than census block group data for analyzing social vulnerability. This was done by applying a social vulnerability method that used census...

  16. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  17. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  18. LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis

    SciTech Connect (OSTI)

    Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

    1986-01-01T23:59:59.000Z

    At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

  19. Strategizing Bhopal: motives and manipulation in response to an industrial disaster

    E-Print Network [OSTI]

    Stephens, Robert Mitchell

    1997-01-01T23:59:59.000Z

    This thesis examines the political and economic motives behind the responses of the Indian Government and nongovernmental organizations to the Union Carbide chemical disaster that occurred on December 3, 1984 in Bhopal India. Using F. G. Bailey...

  20. Resources for Pet, Poultry and Livestock Owners Affected by Natural Disasters

    E-Print Network [OSTI]

    Faries Jr., Floron C.

    2008-09-02T23:59:59.000Z

    This publication lists agencies and other organizations that can help locate missing pets and livestock, assist with carcass disposal, provide animal feed, and help in other ways after a disaster. There are phone numbers and Web addresses for each...

  1. Strategies for an integrated US industry response to a humanitarian disaster

    E-Print Network [OSTI]

    Lam, Sheau Kai

    2007-01-01T23:59:59.000Z

    This thesis focuses on developing strategies to improve coordination between private businesses, relief agencies, and the government in order to deliver more efficient and effective disaster relief during major national ...

  2. Dark tourism: understanding visitor motivation at sites of death and disaster

    E-Print Network [OSTI]

    Yuill, Stephanie Marie

    2004-09-30T23:59:59.000Z

    , numerous sites of death and disaster attract millions of visitors from all around the world: Auschwitz-Birkenau, Anne Frank's House, Graceland, Oklahoma City, Gettysburg, Vimy Ridge, the Somme, Arlington National Cemetery. The list grows each year...

  3. Development of Algorithms to Estimate Post-Disaster Population Dislocation--A Research-Based Approach 

    E-Print Network [OSTI]

    Lin, Yi-Sz

    2010-10-12T23:59:59.000Z

    This study uses an empirical approach to develop algorithms to estimate population dislocation following a natural disaster. It starts with an empirical reexamination of the South Dade Population Impact Survey data, ...

  4. Suggested strategies and best practices in private supply chain disaster response

    E-Print Network [OSTI]

    Budhiraj, Karn

    2010-01-01T23:59:59.000Z

    In times of disaster, demand for goods and services in affected areas spikes. Private companies generally have contingencies in place for business continuity; however, most lack a strategic approach to join the general ...

  5. Option prices in a model with stochastic disaster risk Sang Byung Seo

    E-Print Network [OSTI]

    Kahana, Michael J.

    Option prices in a model with stochastic disaster risk Sang Byung Seo University of Pennsylvania volatility curve. First draft: January 18, 2013. Seo: sangseo@wharton.upenn.edu; Wachter: jwachter

  6. Picking up the pieces : transitional shelters for disaster relief in the northern mountainous regions of Pakistan

    E-Print Network [OSTI]

    Lee, Weifeng Victoria

    2006-01-01T23:59:59.000Z

    This thesis seeks to tackle a complex problem - disaster housing relief - from the angle of architecture design discipline and attempts to find a logical approach to solve such a problem via an in depth examination of a ...

  7. Alternatives for reducing the environmental risks associated with natural disasters and their effects on pipelines 

    E-Print Network [OSTI]

    Wellborn, Michael Wayne

    1996-01-01T23:59:59.000Z

    Past pipeline failure reports have typically focused on corrosion and third party related events. However, natural disasters pose a substantial risk to pipeline integrity as well. Therefore, it was the objective of this thesis to analyze the risks...

  8. The Dynamic Effects of Hurricanes in the US: The Role of Non-Disaster Transfer Payments

    E-Print Network [OSTI]

    Deryugina, Tatyana

    We know little about the dynamic economic impacts of natural disasters. I examine the effect of hurricanes on US counties’ economies 0-10 years after landfall. Overall, I find no substantial changes in county population, ...

  9. A Partition-tolerant Manycast Algorithm for Disaster Area Networks Mikael Asplund, Simin Nadjm-Tehrani

    E-Print Network [OSTI]

    ,simin}@ida.liu.se Abstract--Information dissemination in disaster scenarios requires timely and energy-efficient topology or identity of actors. · Is bandwidth- and energy-efficient in the sense of few transmissions per

  10. Taming Nuclear Power. What have we learned from the Fukushima disaster?

    E-Print Network [OSTI]

    CERN. Geneva

    2011-01-01T23:59:59.000Z

    We analyze the main causes and consequences of the Fukushima nuclear disaster, in comparison with the previous major accidents of Three Mile Island and Chernobyl (among a total of 30 civilian nuclear accidents).

  11. National Disaster Resilience Competition Webinar Series- Q&A Session: Review Completeness Requirements

    Office of Energy Efficiency and Renewable Energy (EERE)

    In light of the recent announcement of the National Disaster Resilience Competition (NDRC), HUD is offering a series of webinars to discuss NDRC NOFA requirements, answer NDRC NOFA questions and...

  12. National Disaster Resilience Competition Webinar Series- Q&A Session: Walk through FAQ's

    Office of Energy Efficiency and Renewable Energy (EERE)

    In light of the recent announcement of the National Disaster Resilience Competition (NDRC), HUD is offering a series of webinars to discuss NDRC NOFA requirements, answer NDRC NOFA questions and...

  13. National Disaster Resilience Competition Webinar Series: Long-Term Commitment Factor

    Broader source: Energy.gov [DOE]

    In light of the recent announcement of the National Disaster Resilience Competition (NDRC), HUD is offering a series of webinars to discuss NDRC NOFA requirements, answer NDRC NOFA questions and...

  14. The Haiti Earthquake: Disaster Lessons and Response from an Emergency Medicine Perspective

    E-Print Network [OSTI]

    Lee, Sharon; Tenny, Montessa

    2010-01-01T23:59:59.000Z

    esident ’ s S ection The Haiti Earthquake: Disaster Lessonsleft the capital city of Haiti in ruins, affecting over 3aid has begun arriving in Haiti, but the situation remains

  15. Obtaining Disaster Assistance for Small Businesses and the Self-Employed

    E-Print Network [OSTI]

    Brown, Pamela J.; Cavanagh, Joyce

    2005-10-11T23:59:59.000Z

    some disasters, large and small businesses are allowed to claim a tax deduction and an exemption from employment taxes if they donate the value of employees? unused leave and vacation time to disaster-related charities. For more information contact.... Small Business Hurricane Guide, Pinellas County Florida, July 2000. www.pinellascounty.org/emergency/PDF/BusGuide. PDF Downloaded October 5, 2005. Texas Department of Insurance. http:// www.tdi.state.tx.us Texas Workforce Commission, downloaded from...

  16. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30T23:59:59.000Z

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  17. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  18. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  19. DOE Hanford Network Upgrades and Disaster Recovery Exercise Support the Cleanup Mission Now and into the Future

    SciTech Connect (OSTI)

    Eckman, Todd J. [Mission Support Alliance, Richland, WA (United States); Hertzel, Ali K. [Lockheed Martin Services, Inc. (United States); Lane, James J. [Lockheed Martin - Information Systems and Global Solutions (United States)

    2013-11-07T23:59:59.000Z

    In 2013, the U.S. Department of Energy's (DOE) Hanford Site, located in Washington State, funded an update to the critical network infrastructure supporting the Hanford Federal Cloud (HFC). The project, called ET-50, was the final step in a plan that was initiated five years ago called "Hanford's IT Vision, 2015 and Beyond." The ET-50 project upgraded Hanford's core data center switches and routers along with a majority of the distribution layer switches. The upgrades allowed HFC the network intelligence to provide Hanford with a more reliable and resilient network architecture. The culmination of the five year plan improved network intelligence and high performance computing as well as helped to provide 10 Gbps capable links between core backbone devices (10 times the previous bandwidth). These improvements allow Hanford the ability to further support bandwidth intense applications, such as video teleconferencing. The ET-50 switch upgrade, along with other upgrades implemented from the five year plan, have prepared Hanford's network for the next evolution of technology in voice, video, and data. Hand-in-hand with ET-50's major data center outage, Mission Support Alliance's (MSA) Information Management (IM) organization executed a disaster recovery (DR) exercise to perform a true integration test and capability study. The DR scope was planned within the constraints of ET-50's 14 hour datacenter outage window. This DR exercise tested Hanford's Continuity of Operations (COOP) capability and failover plans for safety and business critical Hanford Federal Cloud applications. The planned suite of services to be tested was identified prior to the outage and plans were prepared to test the services ability to failover from the primary Hanford data center to the backup data center. The services tested were: Core Network (backbone, firewall, load balancers); Voicemail; Voice over IP (VoIP); Emergency Notification; Virtual desktops; and, Select set of production applications and data. The primary objective of the exercise was to test COOP around the emergency operations at Hanford to provide information on capabilities and dependencies of the current system to insure improved focus of emergency, safety and security capacity in a disaster situation. The integration of the DR test into the ET-50 project allowed the testing of COOP at Hanford and allowed the lessons learned to be defined. These lessons learned have helped improve the understanding of Hanford's COOP capabilities and will be critical for future planning. With the completion of the Hanford Federal Cloud network upgrades and the disaster recovery exercise, the MSA has a clearer path forward for future technology implementations as well as network improvements to help shape the usability and reliability of the Hanford network in support of the cleanup mission.

  20. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01T23:59:59.000Z

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  1. T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

  2. City ecosystem resilience analysis in case of disasters

    E-Print Network [OSTI]

    Asprone, D; Latora, V; Manfredi, G; Nicosia, V

    2013-01-01T23:59:59.000Z

    One of the tasks of urban and hazard planning is to mitigate the damages and minimize the costs of the recovery process after catastrophic events. The rapidity and the efficiency of the recovery process are referred to as resilience. A mathematical definition of the resilience of an urban community has not yet identified. In this paper we propose and test a methodology for the assessment of urban resilience a catastrophic event. The idea is to merge the concepts of the engineering resilience and the ecosystem resilience. As first step we suggest a way to model an urban community inside the framework of complex network theory. Hence, to model the city as a whole, we identify hybrid networks, composed by human elements, i.e. the citizens, and physical networks, i.e. urban lifelines and infrastructures. As second step, we define and evaluate a class of efficiency indexes on the hybrid networks. By modelling the disasters of the physical components and the subsequent recovery process, and by measuring the efficie...

  3. A Roadmap to Risk-Aware Business Process Management

    E-Print Network [OSTI]

    that resources are utilized as efficient as possible and services are managed in an effective way. From vulnerabilities [11][12]. The introduced model consists of four interconnected layers: (1) Business process layerA Roadmap to Risk-Aware Business Process Management Stefan Jakoubi, Thomas Neubauer Secure Business

  4. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19T23:59:59.000Z

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  5. V-062: Asterisk Two Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote

  6. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment of

  7. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartmentWireshark

  8. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities | DepartmentEnergy

  9. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |Department of

  10. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery

  11. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment of

  12. Management Plan Management Plan

    E-Print Network [OSTI]

    Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids

  13. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01T23:59:59.000Z

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  14. Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume 2, Appendix A: Process and protocol

    SciTech Connect (OSTI)

    NONE

    1994-09-01T23:59:59.000Z

    This appendix contains documentation prepared by the Plutonium ES and H Vulnerability Working Group for conducting the Plutonium ES and H Vulnerability Assessment and training the assessment teams. It has the following five parts. (1) The Project Plan describes the genesis of the project, sets forth the goals, objectives and scope, provides definitions, the projected schedule, and elements of protocol. (2) The Assessment Plan provides a detailed methodology necessary to guide the many professionals who have been recruited to conduct the DOE-wide assessment. It provides guidance on which types and forms of plutonium are to be considered within the scope of the assessment, and lays out the assessment methodology to be used. (3) The memorandum from the Project to Operations Office Managers provides the protocol and direction for participation in the assessment by external stakeholders and members of the public; and the guidance for the physical inspection of plutonium materials in storage. (4) The memorandum from the Project to the assessment teams provides guidance for vulnerability screening criteria, vulnerability evaluation and prioritization process, and vulnerability quantification for prioritization. (5) The Team Training manual was used at the training session held in Colorado Springs on April 19--21, 1994 for all members of the Working Group Assessment Teams and for the leaders of the Site Assessment Teams. The goal was to provide the same training to all of the individuals who would be conducting the assessments, and thereby provide consistency in the conduct of the assessments and uniformity in reporting of the results. The training manual in Section A.5 includes supplemental material provided to the attendees after the meeting.

  15. Vulnerability of nuclear power plant structures to large external fires

    SciTech Connect (OSTI)

    Bennett, D.E.

    1983-08-01T23:59:59.000Z

    This report examines the inherent vulnerability of nuclear power plant structures to the thermal environments arising from large, external fires. The inherent vulnerability is the capacity of the concrete safety-related structures to absorb thermal loads without exceeding the appropriate thermal and structural design criteria. The potential sources of these thermal environments are large, offsite fires arising from accidents involving the transportation or storage of large quantities of flammable gases or liquids. A realistic thermal response analysis of a concrete panel was performed using three limiting criteria: temperature at the first rebar location, erosion and ablation of the front (exterior) surface due to high heat fluxes, and temperature at the back (interior) surface. The results of this analysis yield a relationship between incident heat flux and the maximum allowable exposure duration. Example calculations for the break of a 0.91 m (3') diameter high-pressure natural gas pipeline and a 1 m/sup 2/ hole in a 2-1/2 million gallon gasoline tank show that the resulting fires do not pose a significant hazard for ranges of 500 m or greater.

  16. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  17. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  18. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  19. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  20. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  1. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  2. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  3. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  4. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  5. Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion

    SciTech Connect (OSTI)

    Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

    2010-05-21T23:59:59.000Z

    In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

  6. Stress in Adults after a Disaster: Warning Signs and Management (Spanish)

    E-Print Network [OSTI]

    Warren, Judith L.

    2007-10-08T23:59:59.000Z

    personas pueden tener dificultades para concentrarse, prestar atenci?n y recordar cosas. La concentraci?n y el enfoque pueden verse disminuidos por fatiga, pensamientos recurrentes del desastre y preocupaci?n acerca del futuro. Rendimiento laboral... adecuado del estr?s luego de un desastre puede disminuir sus sentimientos de angustia. A continuaci?n, se describen diferentes acciones que pueden ayudarlo a aliviar el estr?s: Cu?dese a usted mismo: Este enfoque lo ayudar? a lidiar con los factores de...

  7. Stress in Adults after a Disaster: Warning Signs and Management (Spanish) 

    E-Print Network [OSTI]

    Warren, Judith L.

    2007-10-08T23:59:59.000Z

    necesita. En este caso, busque otras fuentes de apoyo. Preserve las rutinas: De ser posible, ap?guese a su rutina normal. Esto puede ayudarlo a tener una sensaci?n de normalidad as? como a mantener los contactos sociales usuales en la escuela, trabajo... recuperaci?n del desastre. Es posible que desee brindar apoyo escuchando las experiencias del desastre de otros. Sin embargo, para evitar sentirse ?agotado? por involucrarse tanto, debe reconocer sus propios l?mites. Busque el tiempo y el apoyo...

  8. Disaster debris management and recovery of housing stock in San Francisco, CA

    E-Print Network [OSTI]

    Saiyed, Zahraa Nazim

    2012-01-01T23:59:59.000Z

    This thesis investigates the potential effects of a 7.2 magnitude earthquake in San Francisco City, particularly the implications on San Francisco's residential housing stock and impacts on the construction and demolition ...

  9. Job Stress in Disaster Case Managers Working with Hurricane Ike Recovery

    E-Print Network [OSTI]

    Forman, Megan Hajecate

    2011-10-21T23:59:59.000Z

    . Based on answers selected by the respondents, frequency and severity scores for each of the thirty stressors identified through the instrument were calculated. Based on severity and frequency scores for the stressors, scores were calculated for the job...

  10. In the past, disaster management used to only include support for hurricanes, floods, tornados, and earthquakes

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To:DepartmentDepartment of EnergyEnergy John SchuelerInThe

  11. The Environmental Management Project Manager`s Handbook for improved project definition

    SciTech Connect (OSTI)

    NONE

    1995-02-01T23:59:59.000Z

    The United States Department of Energy (DOE) is committed to providing high quality products that satisfy customer needs and are the associated with this goal, DOE personnel must possess the knowledge, skills, and abilities to ensure successful job performance. In addition, there must be recognition that the greatest obstacle to proper project performance is inadequate project definition. Without strong project definition, DOE environmental management efforts are vulnerable to fragmented solutions, duplication of effort, and wastes resources. The primary means of ensuring environmental management projects meet cost and schedule milestones is through a structured and graded approach to project definition, which is the focus of this handbook.

  12. Using vulnerability assessments to design facility safeguards and security systems

    SciTech Connect (OSTI)

    Snell, M.; Jaeger, C.

    1994-08-01T23:59:59.000Z

    The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

  13. VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN

    E-Print Network [OSTI]

    Richner, Heinz

    VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

  14. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  15. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  16. Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data

    E-Print Network [OSTI]

    Mitasova, Helena

    Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

  17. Impact of relief accuracy on flood simulations and road network vulnerability analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

  18. Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to

    E-Print Network [OSTI]

    Melcher, Peter

    nega- tive pressures (Dixon and Joly, 1895; Briggs, 1950) allows plants to power the movement of water to withstand tension-induced cavitation is typ- ically inferred from "vulnerability curves" generatedVulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels

  19. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  20. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  1. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  2. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  3. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui infrastructure and begins to show its inability as the demand for power delivery and consumption boosts in recent power grid. This integration, however, brings a new host of vulnerabilities stem from Internet and opens

  4. Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California

    E-Print Network [OSTI]

    the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

  5. Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant

    SciTech Connect (OSTI)

    HERZOG, K.R.

    1999-09-01T23:59:59.000Z

    A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

  6. Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii

    E-Print Network [OSTI]

    Herrera, Carlos M.

    vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

  7. Seismic vulnerability analysis of moderate seismicity areas using in situ experimental

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

  8. DISASTER MEDICINE/ORIGINAL RESEARCH Burden of Disease and Health Status Among Hurricane Katrina

    E-Print Network [OSTI]

    Scharfstein, Daniel

    DISASTER MEDICINE/ORIGINAL RESEARCH Burden of Disease and Health Status Among Hurricane Katrina: Anecdotal evidence suggests that the population displaced to shelters from Hurricane Katrina had in Louisiana 2 weeks after landfall of Hurricane Katrina. In stage 1, shelters with a population of more than

  9. Welfare effects of natural disasters in developing countries: an examination using multi-dimensional socioeconomic indicators

    E-Print Network [OSTI]

    Columbia University

    technologies that boosts growth. Though geophysical disasters might be expected to have a similar effect capital such as the destruction of schools and health care facilities that would not show in GDP, loss of key assets, disruption of health causing increases in child and maternal mortality and loss

  10. Smart Wireless Sensor System for Lifeline Health Monitoring under a Disaster Event

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    of the acquired data and the flexibility of wireless communication technologies. We employ a non of millions. Early detection and preventive repair would be ideal but are not always possible. Therefore, real-time detection and timely damage control are the key to minimizing the adverse impact of such disaster events

  11. FEMA: Family Basic Disaster Supplies There are six basics you should stock in your home

    E-Print Network [OSTI]

    Su, Xiao

    the containers with dishwashing soap and water, and rinse completely so there is no residual soap. Follow the bottles with dishwashing soap and water, and rinse completely so #12;there is no residual soapFEMA: Family Basic Disaster Supplies There are six basics you should stock in your home: Water

  12. On August 29th 2005, the worst natural disaster in American history struck our home.

    E-Print Network [OSTI]

    #12;On August 29th 2005, the worst natural disaster in American history struck our home and stabilize our economy. Then together, we can begin to work toward a shared vision of a great city For Outcomes Process 7 Restore Public Safety 8 Electricity and Gas 9 Debris Removal/Waste Removal 9 Basic

  13. January February 2009 http://pdm.medicine.wisc.edu Prehospital and Disaster Medicine SPECIAL REPORT

    E-Print Network [OSTI]

    Scharfstein, Daniel

    was a significant public health concern in the aftermath of Hurricane Katrina. In response, the Mississippi USA Correspondence: Dr. Andrew Cavey 50b Cambridge Road London SW11 4RR United Kingdom E-mail: andrew.cavey@post.harvard.edu Keywords: disasters; education model; hotline; Hurricane Katrina; infectious diseases; Mississippi

  14. Gulf oil spill's ripples still a worry Warranted or not, disaster fears loom

    E-Print Network [OSTI]

    Belogay, Eugene A.

    Gulf oil spill's ripples still a worry Warranted or not, disaster fears loom BY JIM WAYMER from the nation's worst-ever oil mess. Oceanographers want to know the paths of underwater oil plumes. Biologists wonder if nesting sea turtles that accidentally gulped oil will lay viable eggs or whether eggs

  15. Post-Disaster Reconstruction Models in the Asia Pacific: the cases of China, Iran and

    E-Print Network [OSTI]

    Botea, Adi

    Post-Disaster Reconstruction Models in the Asia Pacific: the cases of China, Iran and Myanmar Helen ­ Sichuan Earthquake 2008 Iran ­ Bam Earthquake 2003; Tabriz Earthquake 2012 Myanmar ­ Cyclone Nargis 2008 element in psycho-social recovery and reconstruction phase. #12;Iran Model Iran: Bam Earthquake 2003

  16. Sustainable shelters for post disaster reconstruction : an integrated approach for reconstruction after the South Asia earthquake

    E-Print Network [OSTI]

    Ali, Zehra (Zehra Hyder)

    2007-01-01T23:59:59.000Z

    A year after the South Asia earthquake, over 60% of the survivors are still vulnerable due to the lack of adequate shelter, the absence of basic facilities for water and sanitation and livelihood restoration. The harsh ...

  17. Transportation Center Seminar........ Anticipating Disaster: Planning for Emergency Logistics Needs

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    for computing in the College of Engineering. He has held visiting professor appointments at General Motors Needs Mark Turnquist Professor of Civil and Environmental Engineering Cornell University in the Master of Engineering program in engineering management. Turnquist is a past chairman

  18. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01T23:59:59.000Z

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  19. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26T23:59:59.000Z

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  20. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    of the European Infrastructure for Electrical Power Exchange Antonio DIU Louis WEHENKEL Red Electrica de Espa~na S other places around the World, in Europe the electric power sector is undergoing a series of very impor. While the Euro- pean Electric Power System (EPS) was traditionally con- sidered as one of the most

  1. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere isArbitrary|

  2. --RIT captures Haiti disaster with high-tech imaging system --In the aftermath of the Jan. 12 earthquake that struck

    E-Print Network [OSTI]

    Rogers, John A.

    NEWS TECHNOLOGY -- RIT captures Haiti disaster with high-tech imaging system -- In the aftermath of the Jan. 12 earthquake that struck Haiti's capital, Port-au-Prince, scientists from Rochester Institute

  3. EIS-0220: Interim Management of Nuclear Materials at the Savannah River Site

    Broader source: Energy.gov [DOE]

    This environmental impact statement assesses the potential environmental impacts of actions necessary to manage nuclear materials at the Savannah River Site (SRS) in Aiken, South Carolina, until decisions on their ultimate disposition are made and implemented. The Department of Energy has decided to initiate actions which will stabilize certain of the SRS materials that represent environment, safety and health vulnerabilities in their current storage condition or which may represent a vulnerability within the next 10 years.

  4. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  5. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L., E-mail: jalonne@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 109 S. Observatory, SPH II, Rm. M6314, Ann Arbor, MI 48109 (United States); Sanchez, Brisa N., E-mail: brisa@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Jolliet, Olivier, E-mail: ojolliet@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Zhang, Zhenzhen, E-mail: zhzh@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Parker, Edith A., E-mail: Edith-Parker@uiowa.edu [University of Michigan School of Public Health, Health Behavior and Health Education Department, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Timothy Dvonch, J., E-mail: dvonch@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 1415 Washington Heights, 6642 SPH Tower, Ann Arbor, MI 48109 (United States); O'Neill, Marie S., E-mail: marieo@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6631 SPH Tower, 1415 Washington Heights, Ann Arbor, MI 48109 (United States)

    2012-01-15T23:59:59.000Z

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  6. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03T23:59:59.000Z

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

  7. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

    1998-01-01T23:59:59.000Z

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  8. A graph-based system for network-vulnerability analysis

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.

    1998-06-01T23:59:59.000Z

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  9. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report

    SciTech Connect (OSTI)

    NONE

    1994-09-01T23:59:59.000Z

    This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

  10. An Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B [ORNL; Payne, Patricia W [ORNL

    2012-01-01T23:59:59.000Z

    Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

  11. U-238: HP Service Manager Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

  12. Insuring Electric Power for Critical Services After Disasters with Building-Sited Electric Generating Technologies

    E-Print Network [OSTI]

    Jackson, J.

    2006-01-01T23:59:59.000Z

    Insuring Electric Power for Critical Services After Disasters with Building-Sited Electric Generating Technologies Jerry Jackson, Associate Professor, Texas A&M University, College Station, TX Abstract Electric power failures... available with new building-sited combined heat and power (CHP) electric generation technologies. This paper evaluates the physical requirements and costs of preemptively installing these new building- sited electric generation technologies to insure...

  13. Crop insurance as a form of disaster relief: an analysis of the alternatives

    E-Print Network [OSTI]

    Crenwelge, Cheryl

    1990-01-01T23:59:59.000Z

    coverage. e Provide an approval method for farmers who wish to produce crops that would not typically be covered in a specific areas. ~ Allow farmers to prove actual yields for the Disaster Protection portion of the plan as well as for additional crop... RELIEF. AN ANALYSIS OP THE ALTERNATIVES Cheryl Crenwelge INTRODUCTION The federal crop insurance program faces warranted scrutiny in the formulation of the 1990 Farm Bill. After major reform in 1980, the program was intended to provide the primary...

  14. Advancing Equipment Reliability via a Natural Disaster Opportunities for Thinking Outside the Box

    E-Print Network [OSTI]

    Stephens, R.

    2006-01-01T23:59:59.000Z

    Advancing Equipment Reliability via a Natural Disaster, Opportunities for Thinking Outside the Box Robert Stephens, Senior Electrical Engineer, ExxonMobil, Chalmette Abstract As the equipment assessments came in after hurricane Katrina... was driven by the desire to harden equipment against future hurricanes, not just replace the equipment in kind. Pre-Katrina reliability teams had defined the architecture of the future. The devastation provided an opportunity for the vision to become...

  15. International considerations associated with economic planning for recovery from a generalized disaster

    SciTech Connect (OSTI)

    Jones, D.W.; Hill, L.J.

    1988-06-01T23:59:59.000Z

    This report addresses international economic considerations in planning for recovery from a generalized disaster, including the geographical dispersion of economic activity and the importance of the US dollar in international trade. The discussion includes real trade issues and international monetary considerations or financial considerations, emphasizing the relationship between the two. Included in the discussion of international monetary considerations are the causes, consequences, and resolution of six historical financial crises which are used as analogues for planning for restoration of the international monetary system. Additionally, the foundation of the multinational enterprise and its possible roles in recovery are addressed. Although the report addresses several specific disaster scenarios and appropriate policy responses in reaction to them, a number of important general policy guidelines were discussed. First, international cooperation and coordination are of paramount importance in restoring the effective functioning of the international monetary system. Second, a policy of fixed exchange rates in the aftermath of an international disaster is ill-advised. Third, except for commodities crucial to national defense, domestic import and export controls cannot be justified. Fourth, the extent of real trade reduction during a conflict has widespread financial---as well as real---repercussions. The United States probably could withstand real trade disruptions during a conflict more successfully than many of its current trading partners. Finally, multinational enterprises might be important institutions in recovery from both real and monetary standpoints, acting as the international conduit for capital flows, trade flows, and in more serious disasters, price signals and international monetary and financial reconstruction. 91 refs., 5 tabs.

  16. Columbia University, EE Technical Report #2008-08-26, Aug. 2008 Assessing the Vulnerability of

    E-Print Network [OSTI]

    Zussman, Gil

    disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse, Electromagnetic Pulse (EMP). I. INTRODUCTION The global communications infrastructure is primarily based on fiber by anything from Electromagnetic Pulse (EMP) attacks [14], [24] to dragging anchors [6], [27]. Such real

  17. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  18. Seismic vulnerability of older reinforced concrete frame structures in Mid-America

    E-Print Network [OSTI]

    Beason, Lauren Rae

    2004-09-30T23:59:59.000Z

    This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

  19. Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard

    E-Print Network [OSTI]

    Leal, Manuel S.

    Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

  20. A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

  1. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22T23:59:59.000Z

    Do nations' allies and trading partners affect their vulnerability to transnational terrorist attacks? Prior research has focused on how the attributes of individual nations, such as regime type, economic stability, and international power, affect...

  2. DNA repair modulates the vulnerability of the developing brain to alkylating agents

    E-Print Network [OSTI]

    Samson, Leona D.

    Neurons of the developing brain are especially vulnerable to environmental agents that damage DNA (i.e., genotoxicants), but the mechanism is poorly understood. The focus of the present study is to demonstrate that DNA ...

  3. Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems

    E-Print Network [OSTI]

    Michaud, David, 1975-

    2005-01-01T23:59:59.000Z

    The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

  4. A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress

    E-Print Network [OSTI]

    Covington, Herbert E.

    Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

  5. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01T23:59:59.000Z

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to further characterise...

  6. Racial Geography, Economic Growth and Natural Disaster Resilience

    SciTech Connect (OSTI)

    Li, Huiping [University of North Carolina at Charlotte; Fernandez, Steven J. [Oak Ridge National Laboratory; Ganguly, Auroop [Oak Ridge National Laboratory

    2014-03-01T23:59:59.000Z

    Recent development of National Response Plans and National Incident Management Plans has emphasized the need for interoperability of plans, systems, technology, and command structures. However, much less emphasis has been placed on equally important elements such as the at-risk populations’ response to those plans, systems, and directions. The community-wide consequences of Hurricane Katrina demonstrated that the protection of communities should no longer be considered only a function of public organizations. Private organizations, nonprofit organizations and individual households have significant roles to play in these plans (Comfort 2006, Salamon 2002). This study is a first attempt to characterize the effect on the resilience (recovery) of metropolitan areas by the presence (or absence) of separate small communities within a larger jurisdiction. These communities can be based on many different social cleavages (ethnic, racial, economic, social, geographic, linguistic, etc.).

  7. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E. [and others

    1996-02-15T23:59:59.000Z

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  8. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  9. Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico

    E-Print Network [OSTI]

    Sanchez Flores, Maria Del Rosario

    2010-10-12T23:59:59.000Z

    and Hydrological Science iii ABSTRACT Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico. (August 2009) Maria del Rosario Sanchez Flores, B.S., Monterrey Tech.; M.S., Instituto Matias Romero Co-Chairs of Advisory Committee: Dr... this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer...

  10. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  11. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  12. Kiran Chandra Sapkota Livelihood strategies and vulnerability of urban poor

    E-Print Network [OSTI]

    Richner, Heinz

    management of drinking water. 97.7 percent HHs have got the electricity and entertainment facilities, electric charge, etc. This study has tried to show five capital assets of urban poor in Khadi Pakha in local social institution but not represented in local government. Above 95 percent HHs involved

  13. Los Alamos National Laboratory emergency management plan. Revision 1

    SciTech Connect (OSTI)

    Ramsey, G.F.

    1998-07-15T23:59:59.000Z

    The Laboratory has developed this Emergency Management Plan (EMP) to assist in emergency planning, preparedness, and response to anticipated and actual emergencies. The Plan establishes guidance for ensuring safe Laboratory operation, protection of the environment, and safeguarding Department of Energy (DOE) property. Detailed information and specific instructions required by emergency response personnel to implement the EMP are contained in the Emergency Management Plan Implementing Procedure (EMPIP) document, which consists of individual EMPIPs. The EMP and EMPIPs may be used to assist in resolving emergencies including but not limited to fires, high-energy accidents, hazardous material releases (radioactive and nonradioactive), security incidents, transportation accidents, electrical accidents, and natural disasters.

  14. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  15. Network Management Network Management

    E-Print Network [OSTI]

    that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

  16. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  17. Rebuilding After Disaster: Going Green from the Ground Up (Revised) (Brochure), U.S. Department of Energy (DOE), Energy Efficiency & Renewable Energy (EERE)

    Office of Energy Efficiency and Renewable Energy (EERE)

    20-page “how-to” guide describing ways to turn a disaster into an opportunity to rebuild with greener energy technologies. It covers such topics as the importance of energy, options for communities, instructions for developing an energy plan, and other considerations. This guide is intended for the community leaders who have experienced a disaster.

  18. Calculating Nuclear Power Plant Vulnerability Using Integrated Geometry and Event/Fault-Tree Models

    SciTech Connect (OSTI)

    Peplow, Douglas E. [Oak Ridge National Laboratory (United States); Sulfredge, C. David [Oak Ridge National Laboratory (United States); Sanders, Robert L. [Oak Ridge National Laboratory (United States); Morris, Robert H. [Oak Ridge National Laboratory (United States); Hann, Todd A. [Defense Threat Reduction Agency (United States)

    2004-01-15T23:59:59.000Z

    Since the events of September 11, 2001, the vulnerability of nuclear power plants to terrorist attacks has become a national concern. The results of vulnerability analysis are greatly influenced by the computational approaches used. Standard approximations used in fault-tree analysis are not applicable for attacks, where high component failure probabilities are expected; two methods that do work with high failure probabilities are presented. Different blast modeling approaches can also affect the end results. Modeling the structural details of facility buildings and the geometric layout of components within the buildings is required to yield meaningful results.

  19. Department of Energy Plutonium ES&H Vulnerability Assessment Savannah River Site interim compensatory measures

    SciTech Connect (OSTI)

    Bickford, W.E.

    1994-09-15T23:59:59.000Z

    The Savannah River Site (SRS) has recently completed a self-assessment of potential vulnerabilities associated with plutonium and other transuranic materials stored at the site. An independent Working Group Assessment Team (WGAT) appointed by DOE/ES&H also performed an independent assessment, and reviewed and validated the site self-assessment. The purpose of this report is to provide a status of interim compensatory measures at SRS to address hazards in advance of any corrective actions. ES&H has requested this status for all vulnerabilities ranked medium or higher with respect to potential consequences to workers, environment, and the public.

  20. Natural disasters and the gas pipeline system. Topical report, August 1994-June 1995

    SciTech Connect (OSTI)

    Atallah, S.; Saxena, S.; Martin, S.B.; Willowby, A.B.; Alger, R.

    1996-11-15T23:59:59.000Z

    Episodic descriptions are provided of the effect of the Loma Prieta earthquake (1989) on the gas pipeline systems of Pacific Gas & Electric Company and the City of Palo Alto and of the Northridge earthquake (1994) on Southern California Gas` pipeline system. The emergency response plans and activities of South Carolina Electric & Gas Company during hurricane Hugo (1989) and of City Gas Company of Florida and other small gas companies during hurricane Andrew (1992) are also reviewed. Descriptions of the great Flood of 1993 and its effects on the operations of Iowa-Illinois Gas & Electric Company and Laclede Gas Company and of the San Jacinto River Floods on the transmission lines of Valero Gas Co. are also provided. Local and federal regulatory requirements, and the current practices by the gas industry for dealing with natural disasters, such as through preventive measures (e.g., strapping of water heaters, excess flow valves), and the tracking of weather-related events are described. The important role that preplanning and coordination with the local emergency response bodies and other gas utilities plays during a natural disaster is examined.

  1. Development of Algorithms to Estimate Post-Disaster Population Dislocation--A Research-Based Approach

    E-Print Network [OSTI]

    Lin, Yi-Sz

    2010-10-12T23:59:59.000Z

    of infrastructure such as electric power, water/sewer, fuel, transportation and telecommunications (Lindell et al., 2006). Alesch et al. (1993), Dahlhamer & D?Souza (1997), Lindell et al. (2006), and Tierney (1997) reported that small businesses are more... for business recovery. In addition, owners and employees of small businesses are more likely to be socially vulnerable groups such as ethnic minorities or members of low socioeconomic status. Job loss could compound the difficulty of the household recovery...

  2. Arctic sea ice trends and narwhal vulnerability Kristin L. Laidre a,*, Mads Peter Heide-Jrgensen b

    E-Print Network [OSTI]

    Laidre, Kristin L.

    risk assess- ments as this may exceed the natural response capacity of the species. Ó 2004 Elsevier Ltd; Risk assessment; Vulnerability 1. Introduction Significant physical and biological shifts have recently climate change require that species vulnerability be incorporated into population risk models, especially

  3. More information from http://www.researchandmarkets.com/reports/1054243/ Fragile Networks: Identifying Vulnerabilities and Synergies in an

    E-Print Network [OSTI]

    Nagurney, Anna

    and Links in Financial Networks. Chapter 7: Dynamic Networks, the Internet, and Electric Power. Chapter 8: Identifying Vulnerabilities and Synergies in an Uncertain World Description: A unified treatment of the vulnerabilities that exist in real-world network systems?--with tools to identify synergies for mergers

  4. Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    (river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

  5. A graph-theoretical characterization of power network vulnerabilities Fabio Pasqualetti, Antonio Bicchi, and Francesco Bullo

    E-Print Network [OSTI]

    Bullo, Francesco

    of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph in the power network model. The study of dynamical systems in descriptor form has received sensible attention

  6. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

  7. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

  8. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  9. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

  10. Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1

    E-Print Network [OSTI]

    and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

  11. Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass

    E-Print Network [OSTI]

    '. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3·ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

  12. TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack on supervisory was supported by Electric Power Research Center (EPRC) at Iowa State University. C.-W. Ten, C.-C. Liu, and M

  13. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack was supported by the Electric Power Research Center (EPRC) at Iowa State University. Paper no. TPWRS-00963- 2007

  14. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  15. Vulnerability of national economies to the impacts of climate change on fisheries

    E-Print Network [OSTI]

    Reynolds, John D.

    economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

  16. Vulnerability of the New York City Metropolitan Area to Coastal Hazards,

    E-Print Network [OSTI]

    moved from a manufacturing to a service industry-based economy. Mid-town and Lower Manhattan are two on Long Island, NY, and the north- ern New Jersey shore. Beaches and coastal wetlands provide recreational at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

  17. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies, NM, USA Abstract--Modern power grids rely heavily on their control systems operating over and blackouts remain possible if the initial disturbances in the power grid are accompanied by other system

  18. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01T23:59:59.000Z

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  19. Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste

    E-Print Network [OSTI]

    Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

  20. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08T23:59:59.000Z

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  1. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

  2. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

  3. American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE

    E-Print Network [OSTI]

    Pockman, William T.

    1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

  4. Seismic vulnerability assessment to slight dam-age based on experimental modal parameters

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

  5. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    to be able to communicate with smart meters via a Home Area Network (HAN) facilitating efficient powerInternational Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid

  6. From Sustainability to Transformation: dynamics and diversity in reflexive governance of vulnerability, Andy Stirling

    E-Print Network [OSTI]

    Sussex, University of

    of vulnerability, Andy Stirling From "Broadening Out" Appraisal to "Opening Up" Commitments This chapter turns our-technical choice (Stirling, 2008a). Organizational, cultural, political, and economic forces structure our implications (Stirling, 2008b). In this way, we can extend attention to alternative trajectories reflecting

  7. EXTREME EVENTS: OBSERVATIONS, MODELING AND ECONOMICS, VOL. ???, XXXX, DOI:10.1029/, Impacts of natural disasters on a dynamic economy

    E-Print Network [OSTI]

    Ghil, Michael

    of natural disasters on a dynamic economy Andreas Groth,1,2 Patrice Dumas,3,1 Michael Ghil,1,2,4 and St.S. economy, based on multivariate singular spectrum analysis. We analyze a total of nine aggregate indicators in a 52-year interval (1954­2005) and demonstrate that the be- havior of the U.S. economy changes

  8. he chain of calamity now known as Japan's Triple Disaster began with a massive rupture in the ocean floor.

    E-Print Network [OSTI]

    McCartney, Michael S.

    . At the Fukushima Dai-ichi nuclear power plant, commissioned in 1971 on the coast 140 miles north of Tokyo, reaching heights up to 49 feet. minuTes LaTer In Fukushima, the Dai-ichi nuclear plant withstood shaking nuclear disaster since Chernobyl in 1986. Without their cooling systems, three of the plant's six re

  9. The Honda Point Disaster was the largest peacetime loss of U.S. Navy ships. On the evening

    E-Print Network [OSTI]

    Clarke, Keith

    1 The Honda Point Disaster was the largest peacetime loss of U.S. Navy ships. On the evening of September 8, 1923, seven destroyers, while traveling at 20 knots (37 km/h), ran aground at Honda Point not to slow down. · The dead reckoning was wrong, and the mistakes were fatal. #12;2 #12;3 Honda Point #12;

  10. Impacts of Radioactive 137Cs on Marine Bacterioplankton: Effects of the Fukushima Disaster on Hawaii's Kaneohe Bay Bacterial Communities

    E-Print Network [OSTI]

    Heller, Paul

    Impacts of Radioactive 137Cs on Marine Bacterioplankton: Effects of the Fukushima Disaster such catastrophe, a tsunami off the coast of Japan, occurred on March 11, 2011. The tsunami caused the Fukushima on the bacterioplankton community of Kaneohe Bay in Oahu, Hawaii. The bay is in the direct path of Fukushima's radioactive

  11. Study: Exposure to crude oil from the Deepwater Horizon disaster causes swimming deficiencies in juvenile mahi mahi

    E-Print Network [OSTI]

    Grosell, Martin

    , the 2010 Deepwater Horizon oil spill also had profound impacts on the open ocean and deep sea environmentStudy: Exposure to crude oil from the Deepwater Horizon disaster causes swimming deficiencies in juvenile mahi mahi Posted on June 12, 2014 by Bob Berwyn Evidence is mounting that BP's oil harmed millions

  12. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01T23:59:59.000Z

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  13. Population segments with disabilities

    E-Print Network [OSTI]

    Stough, Laura

    with disabilities given the large prevalence of this population throughout the world, the intensity of their social vulnerabilities in disaster, and recent federal mandates that specify equal access for individuals with disabilities to emergency preparedness..., as “special needs” populations. More recently, the functional-needs approach to defining disability-related needs during disaster was adopted by the Federal Emergency Management Agency (2010) in its Comprehensive Preparedness Guide 101 and in the National...

  14. APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation

    E-Print Network [OSTI]

    Brownstone, Rob

    on built infrastructure. It will examine the evolution of the term vulnerability and explore current infrastructure vulnerabilities (potential for increased moisture damage to buildings or interruptions in electrical power generation) (Berry et al., 2008; Canadian Council of Professional Engineers, 2008

  15. SUBCONTRACT MANAGEMENT

    Energy Savers [EERE]

    0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish,...

  16. Management of Control System Information SecurityI: Control System Patch Management

    SciTech Connect (OSTI)

    Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

    2011-09-01T23:59:59.000Z

    The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

  17. Hospitality Management Hospitality Management

    E-Print Network [OSTI]

    McConnell, Terry

    of the Department of Hospitality Management and to the recorder in the College of Human Ecology. Required HPM 114 Food Safety and Quality Assurance 2 AND HPM 115 Food Science I 3 AND HPM 216 Restaurant and Food Service Operations 4 OR NSD 225 Nutrition in Health 3 12 credits needed: HPM 300 Selected Topics: Advanced

  18. Drought affects virtually all regions of the world and results in significant economic, social, and environmental impacts. The Federal Emergency Management Agency estimates

    E-Print Network [OSTI]

    Goddard, Steve

    geospatial decision-support tools to address agricultural drought hazards and identify regions of vulnerability in the management of drought risk. The goal of the National Agricultural Decision Support System assess- ment and exposure analysis. Drought risk management involves both expanding our ability

  19. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  20. ISDA 2010, Montpellier, June 28-30, 2010 1 HOUSEHOLDS' RISK MANAGEMENT STRAGIES

    E-Print Network [OSTI]

    Boyer, Edmond

    TO POVERTY IN RURAL CHINA Tai Xiujun* , Li Shuzhuo**, Feldman W. Marcus***, Gretchen C. Daily **** *School and vulnerability to poverty, we propose a new model based on qualitative data analysis and test it using, precautionary financial saving, and informal social supports are major risk management strategies, which can

  1. 14 em august 2013 awma.org Copyright 2013 Air & Waste Management Association

    E-Print Network [OSTI]

    Rohs, Remo

    ) exposure to air pollution, and (3) social and health vulnerability. These three scores are then added and playgrounds because these are land uses where air pollution sensitive populations (very young, elderly14 em august 2013 awma.org Copyright 2013 Air & Waste Management Association em · feature Whether

  2. A watershed-based method for environmental vulnerability assessment with a case study of the Mid-Atlantic region

    SciTech Connect (OSTI)

    Tran, Liem T., E-mail: ltran1@utk.edu [Department of Geography, University of Tennessee, Knoxville, TN (United States); O& #x27; Neill, Robert V. [OTIE and Associates, Oak Ridge, TN (United States); Smith, Elizabeth R. [U.S. Environmental Protection Agency, Office of Research and Development, National Exposure Research Laboratory, Research Triangle Park, NC (United States)

    2012-04-15T23:59:59.000Z

    The paper presents a method for environmental vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of 'self-/peer-appraisal' of a watershed in term of vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative vulnerability pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning. - Highlights: Black-Right-Pointing-Pointer We present a method for regional environmental vulnerability assessment. Black-Right-Pointing-Pointer It is based on the self-/peer-appraisal concept in term of vulnerability. Black-Right-Pointing-Pointer The analysis is facilitated by two separate linear optimization programs. Black-Right-Pointing-Pointer The method provides insights on the regional relative vulnerability pattern.

  3. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03T23:59:59.000Z

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  4. For Planning and Discussion Purposes Only Low Latency DESDynI Data Products for Disaster Response, Resource Management and

    E-Print Network [OSTI]

    Schaffer, Steven

    on polarimetric backscatter of repeat pass imagery potentially useful for structural collapse (earthquake), mud an enormous amount of data using a repeat pass Interferometric Synthetic Aperture Radar operating at 1.2 GHz on the Uninhabited Aerial Vehicle Synthetic Aperture Radar (UAVSAR), an airborne radar system typically flying

  5. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01T23:59:59.000Z

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  6. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4;DepartmentVulnerabilities |Department

  7. Physical Resource Management and Access Mediation Within the Cloud Computing Paradigm

    E-Print Network [OSTI]

    Betts, Hutson

    2012-10-19T23:59:59.000Z

    are typically assumed vulnerable, including parts of the virtual private cloud hosted within other cloud providers. However, as noted earlier, compromised virtual private clouds should not imply a higher risk to cloud providers whose infrastructures... 4.10 Access Pathway Manager integration into a generic infrastructure man- agement tool-kit. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 40 4.11 Access Pathway Manager integration into the OpenNebula software stack. Figure...

  8. Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA

    SciTech Connect (OSTI)

    Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

    1992-10-01T23:59:59.000Z

    This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

  9. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01T23:59:59.000Z

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  10. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01T23:59:59.000Z

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  11. EP&R Standards Project Report: Technical Review of National Incident Management Standards

    SciTech Connect (OSTI)

    Stenner, Robert D.

    2007-04-24T23:59:59.000Z

    The importance and necessity for a fully developed and implemented National Incident Management System (NIMS) has been demonstrated in recent years by the impact of national events such as Hurricane Katrina in 2005. Throughout the history of emergency response to major disasters, especially when multiple response organizations are involved, there have been systemic problems in the consistency and uniformity of response operations. Identifying national standards that support the development and implementation of NIMS is key to helping solve these systemic problems. The NIMS seeks to provide uniformity and consistency for incident management by using common terminology and protocols that will enable responders to coordinate their efforts to ensure an efficient response.

  12. Capacity-building: an inquiry into the local coastal program component of coastal zone management in Louisiana

    E-Print Network [OSTI]

    Norris-Raynbird, Carla

    2007-09-17T23:59:59.000Z

    studies and articles have focused on the local level of government in examining, for instance, hazard mitigation and disaster policy implementation (Godshalk, Brower and Beatley, 1989; Witt, 1988; Beatley, 1986; May and Williams, 1986; Rossi, Wright... increasingly important, but that a systematic investigation of state capacity to manage was needed. Beatley, Brower, and Schwab (1994) similarly noted the importance of state programs in the effectiveness of the CZMA, but that the flexibility afforded...

  13. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  14. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  15. Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but

    E-Print Network [OSTI]

    Mencuccini, Maurizio

    Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

  16. Project Management Plan Resident Management System (RMS)

    E-Print Network [OSTI]

    US Army Corps of Engineers

    1 Project Management Plan Resident Management System (RMS) And Quality Control System (QCS Resident Management System.........................................................................................................3 Project Management Plan - Purpose

  17. Of Disasters and Dragon Kings: A Statistical Analysis of Nuclear Power Incidents & Accidents

    E-Print Network [OSTI]

    Wheatley, Spencer; Sornette, Didier

    2015-01-01T23:59:59.000Z

    We provide, and perform a risk theoretic statistical analysis of, a dataset that is 75 percent larger than the previous best dataset on nuclear incidents and accidents, comparing three measures of severity: INES (International Nuclear Event Scale), radiation released, and damage dollar losses. The annual rate of nuclear accidents, with size above 20 Million US$, per plant, decreased from the 1950s until dropping significantly after Chernobyl (April, 1986). The rate is now roughly stable at 0.002 to 0.003, i.e., around 1 event per year across the current fleet. The distribution of damage values changed after Three Mile Island (TMI; March, 1979), where moderate damages were suppressed but the tail became very heavy, being described by a Pareto distribution with tail index 0.55. Further, there is a runaway disaster regime, associated with the "dragon-king" phenomenon, amplifying the risk of extreme damage. In fact, the damage of the largest event (Fukushima; March, 2011) is equal to 60 percent of the total damag...

  18. Establishing functional requirements for emergency management information systems

    SciTech Connect (OSTI)

    Reed, J.H.; Rogers, G.O.; Sorensen, J.H.

    1991-01-01T23:59:59.000Z

    The advancement of computer technologies has led to the development of a number of emergency management information systems (e.g., EIS, CAMEO, IEMIS). The design of these systems has tended to be technologically driven rather than oriented to meeting information management needs during an emergency. Of course, emergency management needs vary depending on the characteristics of the emergency. For example, in hurricanes, onset is typically slow enough to allow emergency managers to simulate evacuations dynamically while in chemical disasters onset may be sufficiently rapid to preclude such simulation(s). This paper describes a system design process in which the analysis of widely recognized emergency management functions was used to identify information requirements and the requisite software and hardware capabilities to deal with rapid onset, low probability, high consequence events. These requirements were then implemented as a prototype emergency management system using existing hardware and software to assure feasibility. Data, hardware, and software requirements were further developed, refined, and made more concrete through an iterative prototyping effort. This approach focuses attention directly on meeting emergency management information needs while avoiding unneeded technological innovations. 10 refs., 4 figs., 1 tab.

  19. California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area

    SciTech Connect (OSTI)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-11-01T23:59:59.000Z

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

  20. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01T23:59:59.000Z

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  1. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01T23:59:59.000Z

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  2. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities | Department

  3. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |

  4. V-061: IBM SPSS Modeler XML Document Parsing Vulnerability | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote Users

  5. V-080: Apple iOS Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment

  6. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |

  7. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department of Energy Cisco|

  8. T-597: WordPress Multiple Security Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment ofWordPress

  9. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment|Adobe

  10. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerabilityApple has

  11. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59CapabilityVulnerabilities | Department1: IBM

  12. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30T23:59:59.000Z

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  13. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C. (Lawrence Berkeley National Laboratory); Pinar, Ali; Lesieutre, Bernard (Lawrence Berkeley National Laboratory); Donde, Vaibhav (ABB Inc., Raleigh NC)

    2009-03-01T23:59:59.000Z

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  14. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13T23:59:59.000Z

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  15. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23T23:59:59.000Z

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  16. Management Analyst

    Broader source: Energy.gov [DOE]

    The Wind and Water Power Technologies Office (WWPTO) manages efforts to improve performance, lower costs, and accelerate deployment of wind and water power technologies, which can play a...

  17. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  18. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program DRAFT Introduction to Enterprise Risk Management at UVM 1 #12;Enterprise Risk Management Program DRAFT What is Enterprise Risk Management? Enterprise risk management governance, and accountability · Facilitates effective management of the uncertainty and associated risks

  19. The effects of aging on the fire vulnerability of nuclear power plant components

    SciTech Connect (OSTI)

    Nowlen, S.P.

    1988-01-01T23:59:59.000Z

    Sandia National Laboratories, under the sponsorship of the US Nuclear Regulatory Commission, has initiated an effort to identify and investigate potential nuclear power plant fire safety issues associated with plant aging. The issues of potential concern, which have been identified are the effects of aging on (1) the vulnerability of electrical equipment to fire induced damage; (2) the propensity with which electrical equipment will initiate, or contribute to the severity of, fires; and (3) the integrity of passive fire protection features. Efforts in this program were initiated late in fiscal year 1988. For fiscal year 1989 efforts will focus on the investigation of the effects of aging on cable damageability and cable flammability. This paper presents the findings of a limited review of past electrical equipment fire aging research and a summary of planned activities for fiscal year 1989. 11 refs., 4 figs.

  20. System vulnerability as a concept to assess power system dynamic security

    SciTech Connect (OSTI)

    Fouad, A.A.; Qin Zhou; Vittal, V. (Iowa State Univ., Ames, IA (United States))

    1994-05-01T23:59:59.000Z

    The concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. This new concept combines information on the level of security and its trend with changing system condition. In this paper the transient energy function (TEF) method is used as a tool of analysis. The energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity ([partial derivative][Delta]V/[partial derivative]p) to a changing system parameter p as an indicator of its trend. The thresholds for acceptable levels of the security indicator ([Delta]V) and its trend ([partial derivative][Delta]V/[partial derivative]p) are related to the stability limits of a critical system parameter. A method is proposed to determine these thresholds using heuristic techniques derived from operating practices and policies for a change in plant generation. Results from the IEEE 50 generator test system are presented to illustrate the procedure.

  1. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26T23:59:59.000Z

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  2. Treatment Effect of Repairs to an Electrical Grid Leveraging a Machine Learned Model of Structure Vulnerability

    E-Print Network [OSTI]

    Rudin, Cynthia

    , USA becky@cs.columbia.edu Cynthia Rudin MIT Sloan School of Management Massachusetts Institute substations, where transformers step the voltage d

  3. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25T23:59:59.000Z

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  4. Project Manager

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a project manager in the Fuel Cell Technologies Office in the DOE-EERE Office of Transportation responsible for a wide variety of highly...

  5. Management Analyst

    Broader source: Energy.gov [DOE]

    The incumbent in this position will serve as a Management Analyst in the Strategy Execution group of the Corporate Strategy organization (SE). The Strategy Execution group develops and coordinates...

  6. Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation (DGT): Proposal of a Spatial

    E-Print Network [OSTI]

    Boyer, Edmond

    Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation.garbolino@mines-paristech.fr Each year millions of tons of Dangerous Goods are transported between France and Italy using especially for the territory Dangerous Goods Transportation (DGT) is a crucial activity that participates to the development

  7. Abstract--This paper looks into the vulnerabilities of the electric power grid and associated communication network, in the

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Abstract--This paper looks into the vulnerabilities of the electric power grid and associated analysis of interdependencies in a critical infrastructure (CI), i.e. the smart grid for electricity in the functionality of the communication system yields a faulty condition in the electric power grid, and find

  8. 194 / JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT / JULY/AUGUST 1999 INDICATORS OF IMPACTS OF GLOBAL CLIMATE CHANGE ON U.S.

    E-Print Network [OSTI]

    Vogel, Richard M.

    194 / JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT / JULY/AUGUST 1999 INDICATORS OF IMPACTS of the indicators, regional reservoir storage vulnerability, is a particularly useful index summarizing (U.S.) to investigate the integrated impacts of potential global warming on water resources. Impacts

  9. Managing Solutions

    E-Print Network [OSTI]

    Baker, Emily

    2007-01-01T23:59:59.000Z

    , and Texas Water --------------------------------------------- Project Managers Cecilia Wagner, Kevin Wagner, Danielle Supercinski, Dr. Bill Fox and Lucas Gregory work to link university researchers and Extension specialists to appropriate funding agen... Irrigators Network. Kevin Wagner, who joined TWRI in 2005 from TSSWCB, has spent several years working with environmental issues. He is currently pursuing his doctorate evaluating best management practices for reducing bacterial runoff from cattle wastes...

  10. Florida Emergency Information Line (Only activated during disasters). . . . . . . . . . . . . . . . . . . . . . . . . . . 1-800-342-3557 Florida Division of Emergency Management (www.FloridaDisaster.org) . . . . . . . . . . . Non-Emergencies 850-413-9900

    E-Print Network [OSTI]

    /) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-800-874-7561 Seminole Tribe Police . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863-983-2285 Seminole Tribe Fire.fpl.com) . . . . . . . . . . . . . . . . . . . . . . . . . . . Outage 1-800-4-OUTAGE (1-800-468-8243) Florida Keys Electric Cooperative (www

  11. Recommended Practice for Patch Management of Control Systems

    SciTech Connect (OSTI)

    Steven Tom; Dale Christiansen; Dan Berrett

    2008-12-01T23:59:59.000Z

    A key component in protecting a nation’s critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nation’s critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.

  12. Business Management Analyst Business Manager Director of Communication Contracts Manager

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    · Business Management Analyst · Business Manager · Director of Communication · Contracts Manager of Sales · President/Owner · Instructor of Business · Senior Buyer · North American Sales Manager · Talent graduation. You will have the skills & knowledge to manage and grow a successful business. You will be able

  13. V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability

    Broader source: Energy.gov [DOE]

    Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security.

  14. Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico 

    E-Print Network [OSTI]

    Sanchez Flores, Maria Del Rosario

    2010-10-12T23:59:59.000Z

    This dissertation examined declining groundwater availability and management strategies for addressing water shortages in the Laguna region located in the states of Coahuila and Durango. Excessive pumping of groundwater ...

  15. An Efficiency Measure for Dynamic Networks with Application to the Internet and Vulnerability

    E-Print Network [OSTI]

    Nagurney, Anna

    Networks Oil and natural gas networks Electricity generation and distribution networks Supply chain). Evolutionary Variational Inequalities and Economic Models for Demand Supply Markets, Mathematical Models, Computational Management Science 4, 355-375. Nagurney, A. (2006). Supply Chain Network Economics: Dynamics

  16. Risk Management Policy Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Policy Category: Strategic Management 1. PURPOSE To support the University will be encouraged to speak openly and honestly. (iii) Managers will monitor risk and will disclose risks identified's risk appetite. 2.3. Risk management standards 2.3.1 The University's risk management framework

  17. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities

    SciTech Connect (OSTI)

    Wilkey, D.D.

    1995-09-01T23:59:59.000Z

    This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

  18. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01T23:59:59.000Z

    Management Program, R-3 • Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

  19. Data Management Policy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policy Data Management Policy The data management resource information and data release policies below are provided to help researchers understand the data...

  20. NERSC Data Management Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policies NERSC Data Management Policies Introduction NERSC provides its users with the means to store, manage, and share their research data products. In addition...

  1. Riparian Area. . . . . . . . . . . . . . . . . . . . Management Handbook

    E-Print Network [OSTI]

    Balasundaram, Balabhaskar "Baski"

    ..............................................................................................................19 Bruce Hoagland, Oklahoma Biological Survey and the University of Oklahoma Forest Management Riparian Area. . . . . . . . . . . . . . . . . . . . Management Handbook E-952 Oklahoma Cooperative . . . . . . . . . . . . . Oklahoma Conservation Commission Management Handbook #12

  2. Office of Legacy Management FY 2009 Energy Management Data Report...

    Office of Environmental Management (EM)

    Office of Legacy Management FY 2009 Energy Management Data Report Office of Legacy Management FY 2009 Energy Management Data Report FY 2009 Energy Management Performance Summary...

  3. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01T23:59:59.000Z

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  4. MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT

    E-Print Network [OSTI]

    of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry

  5. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL Record of Property Transferred from ______ ___________________________________ 2. DEAN (If Applies) ______ ___________________________________ 5. UNIVERSITY DIRECTOR OF MATERIALS MANAGEMENT ______ ___________________________________ 3. HOSPITAL DIRECTOR (If Applies) ______ IF YOU NEED

  6. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01T23:59:59.000Z

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  7. Rajit Gadh and B.S. Prabhu, Radio Frequency Identification (RFID) for the assistance of Katrina related disaster mortuary operations, IEEE Signal Processing, expected to appear March 2006, based on invitation to write short article.

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Rajit Gadh and B.S. Prabhu, Radio Frequency Identification (RFID) for the assistance of Katrina of Katrina Hurricane Victims Rajit Gadh and B.S. Prabhu Recently news.com reported that the U.S. Disaster

  8. Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA. [Human Reliability Analysis (HRA)

    SciTech Connect (OSTI)

    Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

    1992-01-01T23:59:59.000Z

    This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

  9. "Lantern Live" Mobile App Lights Way for Citizens Impacted by Disasters |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The Future of Bad CholesteroliManage Presentation3| DepartmentSecurity

  10. Best Management Practice #1: Water Management Planning

    Broader source: Energy.gov [DOE]

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  11. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

  12. IT4Innovations IT4Innovations Centre of Excellence

    E-Print Network [OSTI]

    Savicky, Petr

    and Polution Modeling,Traffic Monitoring and Management, Disaster Management, ... · Industry: Power Engineering

  13. Stormwater Management 

    E-Print Network [OSTI]

    Jaber, Fouad

    2008-10-23T23:59:59.000Z

    . Stormwater also may wash bacteria and other pathogens into swimming areas, creating health hazards that often close beaches. Stormwater may carry debris, such as plastic bags, six-pack rings, and cigarette butts, into water bodies; such debris can choke... the development and implementation of best management practices (BMPs) and achievement of measurable goals at levels sufficient to satisfy each of six minimum control measures and an optional seventh control measure: 1. Public education and outreach...

  14. Issue --04 Catalyst.Management School --Autumn 2012

    E-Print Network [OSTI]

    Stevenson, Mark

    contribution to SME -- Postgraduate symposium on fuel poverty and energy vulnerability -- Sheffield SIFE

  15. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  16. Environmental Management

    SciTech Connect (OSTI)

    None

    2014-11-12T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  17. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01T23:59:59.000Z

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  18. Risk Management, Mar 2012 Risk Management

    E-Print Network [OSTI]

    Risk Management, Mar 2012 Risk Management Conditions of Volunteer Service (Please send completed form to the Office of Risk Management) riskmanagement@uoregon.edu Fax: 541-346-7008 As a volunteer Tort Claims Act, ORS 30.260-300, and Oregon Department of Administrative Services Risk Management

  19. Risk Management Procedures Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT/POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 2 (a) Advise the Vice-Chancellor on the effective management of the University's risk profile

  20. Landscape Management Systems The Visual Management System

    E-Print Network [OSTI]

    Standiford, Richard B.

    Landscape Management Systems The Visual Management System of the Forest Service, USDA1 Warren R presentation on how the Visual Management System (VMS) functions. 1/ Presented at the National Conference Manual 2380, Landscape Management, USDA. INTRODUCTION The American people are concerned about the quality