Powered by Deep Web Technologies
Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

JC3 Incident Reporting | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Management » JC3 Incident Reporting Management » JC3 Incident Reporting JC3 Incident Reporting JC3 Incident Reporting Procedures U.S. Department of Energy Facilities/Contractors Only DOE O 205.1-B Chg 2 4.(c)(13) DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM requires a defined "process for incident reporting that requires all cyber security incidents involving information or information systems, including privacy breaches, under DOE or DOE contractor control must be identified, mitigated, categorized, and reported to the Joint Cybersecurity Coordination Center (JC3) in accordance with JC3 procedures and guidance." This document outlines the referenced JC3 reporting procedures and guidance to facilitate your reporting and CIRC's response activity. CIRC should be informed of all reportable cyber security incidents as specified below.

2

Incident Management | Department of Energy  

Energy Savers (EERE)

systems report cyber security incidents to JC3. JC3 Bulletins are distributed to the DOE community to notify sites of computer security vulnerabilities and recommended actions....

3

JC3 Tools | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

JC3 Tools JC3 Tools JC3 Tools NMAP Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. WireShark Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. Microsoft Network Monitor Network Monitor 3.4 is a protocol analyzer. It allows you to capture network traffic, view and analyze it.Solar Winds IP Address Tracker ISC SANS The ISC was created in 2001 following the successful detection, analysis, and widespread warning of the Li0n worm. Today, the ISC provides a free

4

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

5

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

6

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

7

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

8

JC3 Bulletin Archive | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Bulletin Archive Bulletin Archive JC3 Bulletin Archive RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 6, 2013 V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability A vulnerability has been reported in the CentralAuth extension for MediaWik that allows people to bypass certain security restrictions September 5, 2013 V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously A vulnerability was reported in Cisco Mobility Services Engine where a remote user can login anonymously. September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

9

JC3 High Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 5, 2013 V-211: IBM iNotes Multiple Vulnerabilities IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability August 2, 2013 V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated,

10

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS November 7, 2012 V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

11

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

was reported in RSA Authentication Manager. July 8, 2013 V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host...

12

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

13

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

view files on target system running the IP Office Manager software. June 15, 2011 T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System PHP is prone...

14

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

15

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user can cause denial of service conditions. May 23, 2012 U-175: Linux Kernel KVM Memory Slot Management Flaw A vulnerability was reported in the Linux Kernel. A local user on...

16

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

management domain (Dom0). (CVE-2011-1583) May 18, 2011 T-625: Opera Frameset Handling Memory Corruption Vulnerability The vulnerability is caused due to an error when handling...

17

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7, 2011 7, 2011 U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. October 6, 2011 U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers A remote user can access internal servers. October 5, 2011 U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. October 4, 2011 U-003:RPM Package Manager security update RPM Package Manager Header Validation Flaws Let Remote Users Execute

18

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18, 2013 18, 2013 V-137: Apple Mac OS X update for Java Apple has issued an update for Java for Mac OS X April 17, 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 Several vulnerabilities addressed in this Critical Patch Update affect multiple products April 16, 2013 V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. April 15, 2013 V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. April 14, 2013 V-133: Microsoft pulls Patch Tuesday security fix Microsoft has recommended that an update released in the latest Patch Tuesday be removed, after users reported incidents of the "blue screen of

19

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13, 2013 13, 2013 V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 11, 2013 V-175: Microsoft Security Bulletin Advance Notification for June 2013 Microsoft Security Bulletin Advance Notification for June 2013. Microsoft has posted 1 Critical Bulletin and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" June allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on June 12, 2013, at 11:00 AM

20

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2013 5, 2013 V-127: Samba Bug Lets Remote Authenticated Users Modify Files A remote authenticated user can modify files on the target share April 4, 2013 V-126: Mozilla Firefox Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system April 3, 2013 V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. April 2, 2013 V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Splunk Web. April 1, 2013

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2012 5, 2012 U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system March 2, 2012 U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address. March 1, 2012 U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability A vulnerability in WorkStation files (.ws) by IBM Personal Communications

22

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities Two vulnerabilities were reported in Apache Tomcat November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands A vulnerability was reported in Cisco Prime Data Center Network Manager. October 31, 2012

23

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2012 19, 2012 V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability November 16, 2012 V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions Two vulnerabilities were reported in RSA Data Protection Manager. November 15, 2012 V-025: Bugzilla Multiple Cross Site Scripting and Information Disclosure Vulnerabilities Bugzilla Multiple Vulnerabilities November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice November 13, 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 Microsoft Security Bulletin Advance Notification for November 2012. Microsoft has posted 4 Critical Bulletins and 1 Important Bulletins.

24

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24, 2012 24, 2012 U-176: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. May 23, 2012 U-175: Linux Kernel KVM Memory Slot Management Flaw A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system. May 22, 2012 U-174: Serendipity Unspecified SQL Injection Vulnerability A vulnerability was reported in Serendipity. A remote user can inject SQL commands. May 21, 2012 U-173: Symantec Web Gateway Multiple Vulnerabilities Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote

25

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583) May 18, 2011 T-625: Opera Frameset Handling Memory Corruption Vulnerability The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

26

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. September 26, 2011 T-726:Linux-2.6 privilege escalation/denial of service/information leak Vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. September 23, 2011 T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. September 22, 2011 T-724: Microsoft Security Advisory: Fraudulent digital certificates could

27

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. February 14, 2011 T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote

28

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. November 2, 2011 U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. November 1, 2011 U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data A remote user can obtain configuration information. October 31, 2011 U-023: Debian update for phpldapadmin All versions of phpldapadmin - all released versions as of today are vulnerable to a remote code execution bug. October 28, 2011 U-022: Apple QuickTime Multiple Vulnerabilities

29

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2012 19, 2012 U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in HP StorageWorks File Migration Agent. July 18, 2012 U-215: Oracle Critical Patch Update Advisory - July 2012 Critical Patch Updates are the primary means of releasing security fixes for Oracle products to customers with valid support contracts. They are released on the Tuesday closest to the 17th day of January, April, July and October. July 17, 2012 U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). July 16, 2012 U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

30

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

17, 2012 17, 2012 U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. February 16, 2012 U-105:Oracle Java SE Critical Patch Update Advisory Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. February 16, 2012 U-104: Adobe Flash Player Multiple Vulnerabilities Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. February 15, 2012

31

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-616: PHP Stream Component Remote Denial of Service Vulnerability PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable. May 4, 2011 T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect. May 3, 2011 T-614: Cisco Unified Communications Manager Database Security Vulnerability The vulnerability is due to unspecified errors in the affected software that may allow the attacker to perform SQL injections. An authenticated,

32

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2013 11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets July 10, 2013 V-196: Microsoft Security Bulletin Advance Notification for July 2013 Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada). July 9, 2013 V-195: RSA Authentication Manager Lets Local Users View the Administrative

33

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2012 8, 2012 U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. October 5, 2012 U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. October 4, 2012 U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. October 3, 2012 U-273: Multiple vulnerabilities have been reported in Wireshark

34

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23, 2012 23, 2012 U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. January 20, 2012 U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. January 19, 2012 U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges The system does not properly validate unreferenced URLs. January 18, 2012 U-083:Oracle Critical Patch Update Advisory - January 2012 Critical Patch Update contains 78 new security fixes across all listed product families. January 17, 2012 U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

35

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS June 28, 2013 V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability The vulnerability addresses the possibility of a heap overflow condition June 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 19, 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 Multiple vulnerabilities were reported in Oracle Java. June 14, 2013 V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and

36

JC3 Medium Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks September 3, 2013 V-233: Red Hat update for JBoss Fuse This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS. August 28, 2013 V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

37

JC3 Low Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Low Impact Low Impact Assessment Bulletins JC3 Low Impact Assessment Bulletins RSS July 31, 2013 V-207: Wireshark Multiple Denial of Service Vulnerabilities Successful exploitation of this vulnerability may allow execution of arbitrary code. July 30, 2013 V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities Two vulnerabilities have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the vulnerabilities are caused due to a bundled vulnerable version of Java. November 30, 2011 U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code A remote user can upgrade the printer's firmware with arbitrary code

38

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 5, 2012 July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). June 29, 2012 U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. June 28, 2012 U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

39

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

40

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2013 3, 2013 V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. April 2, 2013 V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Splunk Web. March 27, 2013 V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. March 26, 2013 V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities IBM has acknowledged multiple vulnerabilities March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2012 20, 2012 U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses A remote user can spoof SMS source addresses. August 17, 2012 U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. August 16, 2012 U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. August 15, 2012 U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code Execution of arbitrary code via network A remote user can cause arbitrary

42

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 24, 2011 February 24, 2011 T-564: Vulnerabilities in Citrix Licensing administration components The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console. February 23, 2011 T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. February 22, 2011 T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow A vulnerability has been reported in Novell ZENworks Configuration

43

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

44

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 30, 2011 March 30, 2011 T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. March 18, 2011 T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space. March 17, 2011 T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability Novell Access Manager Java Double Literal Denial of Service Vulnerability. March 16, 2011 T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections

45

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

46

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 17, 2011 June 17, 2011 T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. June 16, 2011 T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. June 1, 2011 T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could infect their systems after visiting a malicious

47

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 18, 2011 T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device. February 17, 2011 T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via

48

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2011 4, 2011 U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. September 30, 2011 T-731:Symantec IM Manager Code Injection Vulnerability Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. September 29, 2011 T-730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution Citrix Provisioning Services is prone to a remote code-execution vulnerability. Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application. September 29, 2011 T-729: Mozilla Code Installation Through Holding Down Enter

49

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 23, 2012 May 23, 2012 U-175: Linux Kernel KVM Memory Slot Management Flaw A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system. May 22, 2012 U-174: Serendipity Unspecified SQL Injection Vulnerability A vulnerability was reported in Serendipity. A remote user can inject SQL commands. May 21, 2012 U-173: Symantec Web Gateway Multiple Vulnerabilities Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. May 15, 2012 U-169: Sympa Multiple Security Bypass Vulnerabilities

50

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 22, 2013 May 22, 2013 V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. May 17, 2013 V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. May 16, 2013 V-157: Adobe Reader / Acrobat Multiple Vulnerabilities These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system May 14, 2013 V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session

51

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 20, 2013 May 20, 2013 V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users A vulnerability was reported in RSA SecurID Products. May 15, 2013 V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges A vulnerability was reported in the Linux Kernel. May 10, 2013 V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. May 9, 2013 V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could

52

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 9, 2012 April 9, 2012 U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. April 6, 2012 U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks A remote user can obtain potentially sensitive information. April 2, 2012 U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. March 30, 2012 U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes

53

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 23, 2011 November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 17, 2011 U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges A local user can obtain elevated privileges on the target system.. November 16, 2011 U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code A remote server can cause the target connected client to crash. November 9, 2011 U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated

54

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 24, 2013 January 24, 2013 V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions. January 23, 2013 V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in EMC AlphaStor. January 22, 2013 V-074: IBM Informix Genero libpng Integer Overflow Vulnerability A vulnerability has been reported in libpng. January 21, 2013 V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw

55

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

56

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 26, 2011 April 26, 2011 T-610: Red Hat kdenetwork security update A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. April 25, 2011 T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user. April 22, 2011 T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to

57

One step closer to the efficient management of speed-related rail incidents  

Science Journals Connector (OSTI)

This paper aims to shed light on frequent and recurring rail-related excess speed incidents observed in the largest railway company in Paris, France, the RATP. Based on internal examples in the RATP transportation rail system, we will identify, by means of a return-on experience method, the main causes behind these incidents. The causes may be of a diverse nature and, if identified, can facilitate the analysis of each speed-related incident. This study, therefore, aims to demonstrate how to better address and efficiently manage such incidents with a view to revealing the dysfunctional elements within the system, deal with them efficiently and, thus, reduce their frequency and scale.

Cheila Duarte Colardelle; Jacques Valancogne; Stephanie Fond

2003-01-01T23:59:59.000Z

58

Risk-informed incident management for nuclear power plants  

E-Print Network (OSTI)

Decision making as a part of nuclear power plant operations is a critical, but common, task. Plant management is forced to make decisions that may have safety and economic consequences. Formal decision theory offers the ...

Smith, Curtis Lee, 1966-

2002-01-01T23:59:59.000Z

59

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

60

JC3 Bulletin Archive  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bulletin-archive Office of bulletin-archive Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-237: TYPO3 Security Bypass Vulnerabilities http://energy.gov/cio/articles/v-237-typo3-security-bypass-vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

JC3 Bulletin Archive  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

SW Washington, DC 202-586-0166 en V-237: TYPO3 Security Bypass Vulnerabilities http:energy.govcioarticlesv-237-typo3-security-bypass-vulnerabilities

62

Incidents of Security Concern  

SciTech Connect

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

63

JC3 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bugs, and others likely to follow shortly. April 25, 2013 V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle...

64

JC3 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Remote Authenticated Users Partially Access Data. April 19, 2011 T-605: Oracle Critical Patch Update Advisory - April 2011 A Critical Patch Update is a collection of patches for...

65

eFRMAC Overview: Data Management and Enabling Technologies for Characterization of a Radiological Release A Case Study: The Fukushima Nuclear Power Plant Incident  

SciTech Connect

The eFRMAC enterprise is a suite of technologies and software developed by the United States Department of Energy, National Nuclear Security Administrations Office of Emergency Response to coordinate the rapid data collection, management, and analysis required during a radiological emergency. This enables the Federal Radiological Monitoring and Assessment Center assets to evaluate a radiological or nuclear incident efficiently to facilitate protective actions to protect public health and the environment. This document identifies and describes eFRMAC methods including (1) data acquisition, (2) data management, (3) data analysis, (4) product creation, (5) quality control, and (6) dissemination.

Blumenthal, Daniel J. [NNSA; Clark, Harvey W. [NSTec; Essex, James J. [NSTec; Wagner, Eric C. [NSTec

2013-07-01T23:59:59.000Z

66

Nuclear Incident Team | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Incident Team | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

67

Women @ Energy: Maria Stanton | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Stanton Stanton Women @ Energy: Maria Stanton March 15, 2013 - 1:19pm Addthis Ms. Maria Stanton is the Project Manager for Incident Management and the Joint Cyber Security Coordination Center (JC3). Ms. Maria Stanton is the Project Manager for Incident Management and the Joint Cyber Security Coordination Center (JC3). Check out other profiles in the Women @ Energy series and share your favorites on Pinterest. Ms. Maria Stanton is the Project Manager for Incident Management and the Joint Cyber Security Coordination Center (JC3). The JC3 maintains the information security of the Energy Department's network systems and operations by examining and mitigating cyber incidents and attacks, collecting threat information, and providing awareness of potential threats and incidents to internal organizations. Ms. Stanton is responsible for the

68

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

Energy Savers (EERE)

Web: http:energy.govcioservicesincident-management E-mail: circ@jc3.doe.gov JC3 services are available to JC3-Joint Cybersecurity Coordination Center, and JC3 Contractors....

69

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2013 26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command August 24, 2013 V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability A vulnerability has been reported in HP StoreOnce D2D Backup Systems. August 23, 2013 V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service A vulnerability was reported in McAfee Email Gateway. August 22, 2013 V-224: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome. August 21, 2013 V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts A remote user can make unlimited login attempts

70

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 22, 2013 March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services March 21, 2013 V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple iOS March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 18, 2013 V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code

71

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2012 29, 2012 U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. March 28, 2012 U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data. March 27, 2012 U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. March 26, 2012 U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can

72

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 1, 2011 March 1, 2011 T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. February 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 25, 2011 T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow

73

JC3 High Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

high-impact-assessment-bulletins high-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities http://energy.gov/cio/articles/v-215-networkminer-directory-traversal-and-insecure-library-loading-vulnerabilities V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities

74

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2013 January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 10, 2013 V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat January 9, 2013 V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code Security updates available for Adobe Flash Player January 8, 2013 V-064: Microsoft Security Bulletin Advance Notification for January 2013 Microsoft Security Bulletin Advance Notification for January 2013 . Microsoft has posted 2 Critical Bulletins and 5 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of

75

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on March

76

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 22, 2011 December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. December 20, 2011 U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. December 19, 2011 U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. December 16, 2011 U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code A remote user can cause the target application to execute arbitrary code on

77

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

78

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2012 11, 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12, 2012, at 11:00 AM Pacific Time (US & Canada). September 11, 2012 U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Apache Wicket September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities

79

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-207: Wireshark Multiple Denial of Service Vulnerabilities Successful exploitation of this vulnerability may allow execution of arbitrary code. July 30, 2013 V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities Two vulnerabilities have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the vulnerabilities are caused due to a bundled vulnerable version of Java. July 27, 2013 V-204: A specially crafted query can cause BIND to terminate abnormally A specially crafted query sent to a BIND nameserver can cause it to crash (terminate abnormally). July 26, 2013 V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and

80

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21, 2011 21, 2011 U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition October 20, 2011 U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. October 19, 2011 U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12, 2012 12, 2012 U-146: Adobe Reader/Acrobat Multiple Vulnerabilities Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive information, and compromise a user's system. April 11, 2012 U-145: Microsoft Security Bulletin Summary for April 2012 Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). April 10, 2012 U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site

82

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2012 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain

83

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21, 2012 21, 2012 U-196: Cisco AnyConnect VPN Client Two Vulnerabilities Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. June 20, 2012 U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. June 19, 2012 U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges Users Gain Elevated Privileges June 18, 2012 U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users

84

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

22, 2012 22, 2012 V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service). October 19, 2012 V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. October 18, 2012 V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions. October 17, 2012

85

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2013 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 26, 2013 V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability A security issue and a vulnerability have been reported in the Login Security module for Drupal June 25, 2013 V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability Apache has acknowledged a vulnerability in Apache OpenOffice SDK June 24, 2013 V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks A vulnerability was reported in Google Chrome.

86

JC3 Low Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

low-impact-assessment-bulletins low-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-207: Wireshark Multiple Denial of Service Vulnerabilities http://energy.gov/cio/articles/v-207-wireshark-multiple-denial-service-vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities

87

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2012 28, 2012 V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. December 27, 2012 V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. December 26, 2012 V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service A vulnerability was reported in Firefly Media Server December 25, 2012 V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM

88

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

89

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15, 2011 15, 2011 U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. November 14, 2011 U-035: Adobe Flash Player Multiple Vulnerabilities Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. November 10, 2011 U-034: Fraudulent Digital Certificates Could Allow Spoofing

90

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30, 2013 30, 2013 V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service) May 29, 2013 V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users Two vulnerabilities were reported in HP-UX Directory Server. May 28, 2013 V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server A vulnerability was reported in Cisco WebEx for iOS. May 27, 2013 V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The system does not properly validate all Inter-Satellite Sync operations

91

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9, 2011 9, 2011 U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges A vulnerability was reported in the Linux Kernel. December 8, 2011 U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. December 7, 2011 U-054: Security Advisory for Adobe Reader and Acrobat This U3D memory corruption vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that the vulnerability is being actively exploited in the wild in limited, targeted attacks against Adobe Reader 9.x on Windows. Adobe Reader X Protected Mode and Acrobat X Protected View

92

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 14, 2012 V-047: IBM Lotus Foundation Multiple Cross Site Scripting Two vulnerabilities have been reported in IBM Lotus Foundations. December 13, 2012 V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. December 12, 2012 V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions A vulnerability was reported in Adobe ColdFusion. December 11, 2012 V-044: IBM Informix Buffer Overflow in Processing SQL Statements Lets Remote Authenticated Users Execute Arbitrary Code A vulnerability was reported in IBM Informix. December 10, 2012 V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities Two vulnerabilities have been reported in Locale::Maketext module for Perl

93

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 T-636: Wireshark Multiple Flaws Let Remote Users Deny Service Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. June 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges

94

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2012 28, 2012 U-246: Tigase XMPP Dialback Protection Bypass Vulnerability A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions. August 27, 2012 U-245: Critical Java 0-day flaw exploited Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines August 27, 2012 U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks Several vulnerabilities were reported in McAfee Email Gateway. August 24, 2012 U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service A vulnerability was reported in libvirt. August 23, 2012 U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local

95

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2012 26, 2012 U-156: Red Hat update for JBoss Enterprise Portal Platform Update for JBoss Enterprise Portal Platform April 25, 2012 U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. April 24, 2012 U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. April 23, 2012 U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service Two vulnerabilities were reported in EMC Data Protection Advisor. A remote

96

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2013 8, 2013 V-087: Adobe Flash Player Two Vulnerabilities Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system. February 7, 2013 V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. February 6, 2013 V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks A vulnerability was reported in Cisco Unity Express. February 5, 2013 V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks Several vulnerabilities were reported in RSA Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities

97

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2012 10, 2012 U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. May 9, 2012 U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. May 8, 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may

98

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 22, 2013 February 22, 2013 V-097: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. February 21, 2013 V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. February 20, 2013 V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Oracle Java.

99

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13, 2011 13, 2011 T-645: Microsoft Security Bulletin Advance Notification Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any detection tools relevant to the updates. June 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the

100

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

102

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2011 11, 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. July 8, 2011 T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker. July 7, 2011

103

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2011 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle filenames with meta characters during tab expansions. This may allow a context-dependent attacker to use a crafted filename to trick another user to execute arbitrary commands, which may allow the attacker to gain elevated privileges. April 4, 2011 T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

104

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. January 4, 2011 T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied

105

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. June 24, 2011 T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. June 23, 2011 T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases. June 22, 2011 T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute

106

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2011 26, 2011 T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. July 25, 2011 T-675: Apple Laptop Battery Interface Lets Local Users Deny Service Apple Laptop Battery Interface Lets Local Users Deny Service July 22, 2011 T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

107

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23, 2011 23, 2011 T-586: Microsoft Advisory about fraudulent SSL Certificates Microsoft Advisory about fraudulent SSL Certificates. March 22, 2011 T-585: Mac OS X v10.6.7 Security Update 2011-001 Mac OS Update: Mac OS 10.6.7 fixes multiple vulnerabilities in the following release. This update can be installed on non-startup volumes, but you should only do this if the current startup volume has already been updated to Mac OS X Server v10.6.7. The simplest way to avoid issues from an improper installation is to start up from the volume that you wish to update. March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin

108

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2011 20, 2011 T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. January 19, 2011 T-537: Oracle Critical Patch Update Advisory - January 2011 A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required because of interdependencies by those security patches. Critical Patch Updates are cumulative. January 18, 2011 T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on

109

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2011 4, 2011 T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. March 11, 2011 T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 10, 2011 T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. March 9, 2011 T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Windows Remote Desktop Client. A remote

110

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24, 2012 24, 2012 U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions A vulnerability was reported in Apache CXF September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes. September 19, 2012 U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site

111

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 25, 2013 January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 24, 2013 V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions. January 23, 2013 V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in EMC AlphaStor. January 22, 2013 V-074: IBM Informix Genero libpng Integer Overflow Vulnerability

112

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2011 14, 2011 T-717: Microsoft Security Bulletin Summary for September 2011 Microsoft Security Bulletin Summary for September 2011. September 14, 2011 T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 13, 2011 T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. September 12, 2011 T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 8, 2011

113

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Bulletin Summary for September 2011. September 14, 2011 T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability Google SketchUp v8.x - '.DAE' File...

114

JC3 Bulletin Archive | Department of Energy  

Energy Savers (EERE)

certain security restrictions and to conduct spoofing attacks September 3, 2013 V-233: Red Hat update for JBoss Fuse This fixes multiple vulnerabilities, which can be exploited...

115

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 V-047: IBM Lotus Foundation Multiple Cross Site Scripting Two vulnerabilities have been reported in IBM Lotus Foundations. December 13, 2012 V-046: Adobe Flash Player Bugs...

116

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive information, and compromise a user's system. April 11, 2012...

117

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines August 27, 2012 U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

118

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2012 U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious...

119

JC3 Bulletin Archive | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

June 7, 2013 V-173: Plesk 0-Day Vulnerability The vulnerability is caused due to PHP misconfiguration in the affected application June 6, 2013 V-172: ISC BIND RUNTIMECHECK...

120

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 T-616: PHP Stream Component Remote Denial of Service Vulnerability PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain...

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bulletins on May 8, 2012, at 11:00 AM Pacific Time (US & Canada). May 7, 2012 U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and...

122

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The vulnerability is caused due to the sitesallmodulesdragdropgalleryupload.php script improperly validating uploaded files, which can be exploited to execute...

123

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in Adobe Shockwave. December 21, 2012 V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities Drupal Core Multiple vulnerabilities December 20, 2012...

124

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bugs, and others likely to follow shortly. April 25, 2013 V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle...

125

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

has issued an update for java-1.7.0-openjdk. January 17, 2013 V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service A vulnerability has been...

126

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

127

JC3 Bulletin Archive | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

insertion attacks August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior...

128

JC3 Bulletin Archive | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the...

129

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to...

130

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Citrix XenServer Web Self Service. February 16, 2012 U-105:Oracle Java SE Critical Patch Update Advisory Multiple vulnerabilities were reported in Oracle Java SE. A remote...

131

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

virtual system. June 14, 2012 U-191: Oracle Java Multiple Vulnerabilities The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are...

132

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical...

133

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

an unsuspecting user to follow a malicious URI. October 25, 2011 U-019: Oracle Critical Patch Update Advisory - October 2011 October 2011 Critical Patch Update, security...

134

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Apple has issued an update for Java for Mac OS X April 17, 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 Several vulnerabilities addressed in this Critical Patch...

135

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Symantec Endpoint Protection Center (SPC) June 19, 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 Multiple vulnerabilities were reported in Oracle Java....

136

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Code, Conduct Cross-Site Scripting Attacks July 20, 2011 T-672: Oracle Critical Patch Update Advisory - July 2011 Due to the threat posed by a successful attack, Oracle...

137

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

execute arbitrary code on the target system. January 19, 2011 T-537: Oracle Critical Patch Update Advisory - January 2011 A Critical Patch Update is a collection of patches for...

138

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to...

139

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Remote Authenticated Users Partially Access Data. April 19, 2011 T-605: Oracle Critical Patch Update Advisory - April 2011 A Critical Patch Update is a collection of patches for...

140

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

does not properly validate unreferenced URLs. January 18, 2012 U-083:Oracle Critical Patch Update Advisory - January 2012 Critical Patch Update contains 78 new security fixes...

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SecurID two-factor authentication products June 8, 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 This Critical Patch Update contains 17 new security fixes...

142

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to...

143

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in HP StorageWorks File Migration Agent. July 18, 2012 U-215: Oracle Critical Patch Update Advisory - July 2012 Critical Patch Updates are the primary means of releasing...

144

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

any validity checks to verify the requests. April 18, 2012 U-150: Oracle Critical Patch Update Advisory - April 2012 Critical Patch Updates are the primary means of releasing...

145

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

people to bypass certain security restrictions. October 17, 2012 V-004: Oracle Critical Patch Update Advisory - October 2012 October 2012 Critical Patch Update, security...

146

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

statement February 16, 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 This Critical Patch Update contains 21 new security...

147

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

148

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

149

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were...

150

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

151

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vulnerability in a security advisory and released software updates. June 1, 2011 T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could...

152

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime...

153

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges...

154

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 8, 2011 T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. August 5, 2011 T-685: Cisco Warranty CD May Load Malware From a Remote Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. August 3, 2011 T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. August 2, 2011 T-682:Double free vulnerability in MapServer MapServer developers have discovered flaws in the OGC filter support in

155

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2011 , 2011 T-547: Microsoft Windows Human Interface Device (HID) Vulnerability Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. January 31, 2011 T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. January 28, 2011 T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code A vulnerability was reported in RealPlayer. A remote user can cause

156

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2013 14, 2013 V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability This security update resolves a vulnerability in the Windows NAT Driver in Microsoft Windows August 12, 2013 V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 7, 2013 V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities

157

JC3 Medium Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

medium-impact-assessment-bulletins medium-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-237: TYPO3 Security Bypass Vulnerabilities http://energy.gov/cio/articles/v-237-typo3-security-bypass-vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities

158

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

159

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15, 2012 15, 2012 U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target August 14, 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 Microsoft Security Bulletin Advance Notification for August 2012. Microsoft has posted 5 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on August 15, 2012, at 11:00 AM Pacific Time (US & Canada). August 14, 2012 U-234: Oracle MySQL User Login Security Bypass Vulnerability

160

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. February 3, 2012 U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. February 1, 2012 U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or an authentication bypass. March 3, 2011 T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability Critical vulnerabilities have been...

162

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Users Execute Arbitrary Code. October 4, 2011 U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities A remote user can create a file that, when loaded by the...

163

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mozilla Firefox and Thunderbird. December 20, 2011 U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability Successful exploitation may allow execution of arbitrary code...

164

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCPIP MS11-083 - Critical Windows TCPIP stack keeps track of UDP packets within memory. November 9, 2011 U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...

165

ORISE: Incident Command System (ICS) Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Incident Command System (ICS) Training Incident Command System (ICS) Training The Oak Ridge Institute for Science and Education (ORISE) supports the emergency response community by promoting interagency cooperation and developing training that enhances response efforts. An example of such support involves the U.S. Department of Energy (DOE) Office of Emergency Response and its compliance efforts toward the Homeland Security Presidential Directive-5 (HSPD-5), which includes the implementation of National Incident Management System (NIMS)/Incident Command System (ICS) and the National Response Framework (NRF). The ICS, which has been recognized for its training curricula that has exceeded national standards, is an on-scene, all-hazard incident management concept that was originally designed for emergency management agencies, but

166

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

167

Radioactive Materials Transportation and Incident Response  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FEMA 358, 05/10 FEMA 358, 05/10 Q A RADIOACTIVE MATERIALS Transportation Emergency Preparedness Program U.S. Department of Energy TRANSPORTATION AND INCIDENT RESPONSE Q&A About Incident Response Q Q Law Enforcement ____________________________________ Fire ___________________________________________ Medical ____________________________________________ State Radiological Assistance ___________________________ Local Government Official ______________________________ Local Emergency Management Agency ___________________ State Emergency Management Agency ___________________ HAZMAT Team ______________________________________ Water Pollution Control ________________________________ CHEMTEL (Toll-free US & Canada) 1-800-255-3924 _________ CHEMTREC (Toll-free US & Canada) 1-800-424-9300 _______

168

Cyber Incidents Involving Control Systems  

SciTech Connect

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

169

Chapter_11_Incidents_of_Security_Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. HS-91 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect the safeguards and security program's capability to protect DOE safeguards and security interests * Indicate failure to adhere to security procedures * Reveal that the system is not functioning properly, by identifying and/or mitigating potential threats (e.g., detecting suspicious activity, hostile acts, etc.).

170

Incident Prevention, Warning, and Response (IPWAR) Manual  

Directives, Delegations, and Requirements

This Manual defines a structured, cohesive, and consistent process for performing incident prevention, warning, and response for DOE's Federal information systems and is consistent with the requirements of Federal laws, Executive orders, national security directives, and other regulations. The Manual also provides requirements and implementation instructions for the Department's Incident Prevention, Warning and Response process, and supplements DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03. DOE N 205.17 cancels this manual. This manual cancels DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, dated 3/18/2002.

2004-09-30T23:59:59.000Z

171

Information Incident Response Procedure  

E-Print Network (OSTI)

Information Incident Response Procedure Authority The Information Incident Response Procedure (IIRP) is authorized under the UWM Information Security Policy S59; section III-D (http://www4.uwm Information Security Office, and UWM Internal Audit. This document will be reviewed and updated annually

Saldin, Dilano

172

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

173

Incidents of Security Concern  

Directives, Delegations, and Requirements

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

174

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2012 2, 2012 U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address. February 22, 2012 U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string. February 16, 2012 U-105:Oracle Java SE Critical Patch Update Advisory Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

175

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

176

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 13, 2012 September 13, 2012 U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code RSA BSAFE SSL-C Multiple Vulnerabilities September 12, 2012 U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code A remote user can cause arbitrary code to be executed on the target user's system. September 11, 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12,

177

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2013 29, 2013 V-144: HP Printers Let Remote Users Access Files on the Printer A vulnerability was reported in HP Printers. April 26, 2013 V-143: Fresh Java issues being exploited in the wild Java issues are being exploited in the wild by exploit kits, with Cool and Redkit specifically being known to use these bugs, and others likely to follow shortly. April 25, 2013 V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java. April 24, 2013 V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems A vulnerability was reported in HP ElitePad 900 April 19, 2013 V-138: Red Hat update for icedtea-web This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions

178

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 21, 2013 February 21, 2013 V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. February 20, 2013 V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Oracle Java. February 15, 2013 V-092: Pidgin Multiple Vulnerabilities Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. February 14, 2013

179

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 1, 2012 August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information Multiple vulnerabilities were reported in Apple Safari. July 26, 2012 U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability ISC BIND is prone to a denial-of-service vulnerability. July 24, 2012

180

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2012 1, 2012 U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. April 30, 2012 U-158: HP NonStop Server Java Multiple Vulnerabilities Multiple vulnerabilities have been reported in HP NonStop Server April 24, 2012 U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. April 20, 2012 U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability The vulnerability is caused due to a type casting error in the

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 10, 2012 September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities September 6, 2012 U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks Barracuda Web Filter Authentification Module Multiple HTML Injection Vulnerabilities September 5, 2012 U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability September 4, 2012 U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service Wireshark is prone to a denial-of-service vulnerability. August 30, 2012 U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users Access

182

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 10, 2011 January 10, 2011 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. January 6, 2011 T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation

183

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 19, 2013 March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 15, 2013 V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. March 14, 2013 V-111: Multiple vulnerabilities have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. March 11, 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 Microsoft Security Bulletin Advance Notification for March 2013. Microsoft

184

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 30, 2011 December 30, 2011 U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service A remote user can cause performance to degrade on the target server. December 22, 2011 U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. December 15, 2011 U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

185

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 28, 2012 November 28, 2012 V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Google Chrome. November 22, 2012 V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service Several vulnerabilities were reported in IBM WebSphere DataPower. November 21, 2012 V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service Adobe ColdFusion Denial of Service Vulnerability November 21, 2012 V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Multiple vulnerabilities were reported in Mozilla Firefox November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice

186

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 28, 2012 February 28, 2012 U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. February 27, 2012 U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service A remote user can send a specially crafted ICMP packet to cause the target service to crash. February 24, 2012 U-110: Samba Bug Lets Remote Users Execute Arbitrary Code A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. February 21, 2012 U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

187

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-127: Microsoft Security Bulletin MS12-020 - Critical Vulnerabilities in Remote Desktop Could Allow Remote Code Execution March 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability

188

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 27, 2011 January 27, 2011 T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities. January 27, 2011 T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker

189

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 26, 2012 January 26, 2012 U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands A remote user can execute arbitrary code on the target system. January 24, 2012 U-087: HP-UX update for Java Multiple vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information. January 18, 2012 U-083:Oracle Critical Patch Update Advisory - January 2012 Critical Patch Update contains 78 new security fixes across all listed product families. January 13, 2012 U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

190

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2011 1, 2011 T-547: Microsoft Windows Human Interface Device (HID) Vulnerability Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. January 25, 2011 T-542: SAP Crystal Reports Server Multiple Vulnerabilities Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. January 21, 2011

191

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 13, 2012 June 13, 2012 U-190: Microsoft Security Bulletin MS12-037 - Critical This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. June 12, 2012 U-188: MySQL User Login Security Bypass and Unspecified Vulnerability An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. June 11, 2012 U-187: Adobe Flash Player Multiple Vulnerabilities Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an

192

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-081: Wireshark Multiple Vulnerabilities Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 18, 2013 V-072: Red Hat update for java-1.7.0-openjdk Red Hat has issued an update for java-1.7.0-openjdk. January 15, 2013 V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code

193

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 28, 2012 December 28, 2012 V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. December 26, 2012 V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service A vulnerability was reported in Firefly Media Server December 24, 2012 V-053: Adobe Shockwave player installs Xtras without prompting A vulnerability was reported in Adobe Shockwave. December 21, 2012 V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities Drupal Core Multiple vulnerabilities December 19, 2012 V-050: IBM InfoSphere Information Server Multiple Vulnerabilities Multiple vulnerabilities have been reported in IBM InfoSphere Information

194

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 31, 2012 January 31, 2012 U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. January 30, 2012 U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic A remote user can decrypt SSL/TLS sessions in certain cases January 27, 2012 U-090: RSA enVision Discloses Environment Variable Information to Remote Users A remote user can view potentially sensitive data on the target system. January 25, 2012 U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain

195

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 2, 2013 July 2, 2013 V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue A a security issue in ASUS RT-N66U Router has been reported July 1, 2013 V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host A vulnerability was reported in Oracle VirtualBox. June 26, 2013 V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability A security issue and a vulnerability have been reported in the Login Security module for Drupal June 25, 2013 V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability Apache has acknowledged a vulnerability in Apache OpenOffice SDK June 24, 2013 V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks A vulnerability was reported in Google Chrome.

196

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 28, 2013 February 28, 2013 V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges A vulnerability was reported in McAfee VirusScan Enterprise. February 26, 2013 V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability A vulnerability has been reported in multiple Honeywell products. February 25, 2013 V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service A vulnerability was reported in the Linux Kernel. February 19, 2013 V-094: IBM Multiple Products Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in multiple IBM products. February 18, 2013 V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges Two vulnerabilities were reported in Symantec PGP Desktop.

197

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 27, 2011 September 27, 2011 T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. September 22, 2011 T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing Microsoft has released a Microsoft security advisory about this issue for IT professionals. September 21, 2011 T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target

198

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2013 1, 2013 V-059: MoinMoin Multiple Vulnerabilities Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. December 31, 2012 V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. December 27, 2012 V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. December 25, 2012

199

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2011 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates. May 31, 2011

200

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 10, 2012 July 10, 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 Microsoft Security Bulletin Advance Notification for July 2012. Microsoft has posted 3 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on July 11, 2012, at 11:00 AM Pacific Time (US & Canada). July 10, 2012 U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system July 2, 2012 U-203: HP Photosmart Bug Lets Remote Users Deny Service A vulnerability was reported in HP Photosmart. A remote user can cause

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

202

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 16, 2011 May 16, 2011 T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks The software does not properly filter HTML code from user-supplied input before displaying the input. May 13, 2011 T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user. May 10, 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011

203

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

204

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25, 2011 25, 2011 U-019: Oracle Critical Patch Update Advisory - October 2011 October 2011 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. October 25, 2011 U-018: Oracle AutoVue ActiveX Control Insecure Method Vulnerabilities Successful exploitation of the vulnerabilities allows execution of arbitrary code. October 20, 2011 U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. October 19, 2011 U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote

205

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 9, 2011 September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 7, 2011 T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks. September 6, 2011 T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. September 2, 2011 T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed By Remote Users Mac OS X keychain certificate settings can be bypassed by remote users September 1, 2011 T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code Pidgin bugs let remote users deny service and potentially execute arbitrary

206

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2012 3, 2012 U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service). August 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 25, 2012 U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache A remote user can poison the DNS cache. July 23, 2012 U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability System access from local network

207

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 26, 2011 October 26, 2011 U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI. October 24, 2011 U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information. October 21, 2011 U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability An unauthenticated, remote attacker could exploit this vulnerability to

208

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 6, 2012 November 6, 2012 V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities Two vulnerabilities were reported in Apache Tomcat October 23, 2012 V-008: Debian Security Advisory Debian update for bind9 October 22, 2012 V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service). October 18, 2012 V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users

209

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 12, 2013 August 12, 2013 V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks August 7, 2013 V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities The vulnerabilities can be exploited by malicious people to potentially compromise a user's system. August 6, 2013 V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service A vulnerability was reported in Samba August 3, 2013 V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

210

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 17, 2012 October 17, 2012 V-004: Oracle Critical Patch Update Advisory - October 2012 October 2012 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. October 16, 2012 V-003: Suse Update For Mozillafirefox - Critical An update that fixes 25 vulnerabilities is now available. October 12, 2012 V-001: Mozilla Security vulnerabilities Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities October 10, 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 Microsoft Security Bulletin Advance Notification for October 2012. Microsoft has posted 1 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of

211

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12, 2011 12, 2011 U-058: Apache Struts Conversion Error OGNL Expression Injection Vulnerability Apache Struts Conversion Error OGNL Expression Injection Vulnerability. December 9, 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada). December 8, 2011 U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

212

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 29, 2011 July 29, 2011 T-679: VMware Security Advisory - VMSA-2011-0010 The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 20, 2011 T-672: Oracle Critical Patch Update Advisory - July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends

213

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2011 29, 2011 U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. December 28, 2011 U-070:Redhat krb5 Critical Security Update Vulnerability can be exploited by malicious people to compromise a vulnerable system. December 27, 2011 U-069: Telnet code execution vulnerability: FreeBSD and Kerberos Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. December 23, 2011 U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities

214

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 28, 2011 July 28, 2011 T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service. July 27, 2011 T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability. July 26, 2011 T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. July 25, 2011 T-675: Apple Laptop Battery Interface Lets Local Users Deny Service Apple Laptop Battery Interface Lets Local Users Deny Service

215

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 11, 2011 April 11, 2011 T-599: Microsoft April 2011 Security Bulletin Release Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. April 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle

216

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 15, 2011 November 15, 2011 U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. November 14, 2011 U-035: Adobe Flash Player Multiple Vulnerabilities Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. November 10, 2011 U-034: Fraudulent Digital Certificates Could Allow Spoofing

217

management  

National Nuclear Security Administration (NNSA)

5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

P...

218

Incident Response Planning for Selected Livestock Shows  

E-Print Network (OSTI)

was interviewed, and then data were transcribed and categorized to consensus. Nine themes arose including: background information, challenges, communication, example incidents, executing incident response, incident response planning, incident response training...

Tomascik, Chelsea Roxanne

2012-02-14T23:59:59.000Z

219

Reporting Incidents Of Security Concern  

Directives, Delegations, and Requirements

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

220

Chapter 17 - Expenditure Incidence and Economy-Wide Incidence Studies  

Science Journals Connector (OSTI)

Abstract Chapter 17 has two distinct sets of topics. The first part offers an analysis of expenditure incidence that covers the incidence of transfer payments, decreasing cost services, and nonexclusive goods. The second part discusses economy-wide incidence studies. Highlighted are the Pechman and Okner sources and uses approach to tax incidence, computable general equilibrium models (briefly), the Auerbach and Kotlikoff analysis of tax incidence in a dynamic setting using an OLG model, and the Fullerton and Rodgers model of lifetime tax incidence. The Appendix to Chapter 17 on tax reform considers four broad-based tax reform proposals that are common in the economics literature, bringing together some theoretical results from previous chapters and then turning to other issues that are not discussed elsewhere in the text. These include whether income from capital should be taxed, Michael Kremer's call for aged-based marginal tax rates, and the general problem of commitment or time-inconsistency in second-best analysis with imperfect information.

Richard W. Tresch

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

GUIDANCE NOTES FOR COMPLETION The following incidents and occurrences must be reported to Safety and Environmental Protection  

E-Print Network (OSTI)

manager and the local Safety Coordinator must be made aware of the incident so that further investigation and/or remedial action can be taken. #12;

Glasgow, University of

222

Computerized Accident Incident Reporting System  

Energy.gov (U.S. Department of Energy (DOE))

The Computerized Accident/Incident Reporting System is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE...

223

ORISE: REAC/TS Radiological Incident Medical Consultation  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiological Incident Medical Consultation Radiological Incident Medical Consultation Radiological Incident Medical Consultation The Oak Ridge Institute for Science and Education (ORISE) provides the U.S. Department of Energy (DOE) with a comprehensive capability to respond effectively to medical emergencies involving radiological or nuclear materials. Through the management of the Radiation Emergency Assistance Center/Training Site (REAC/TS), ORISE provides advice and consultation to emergency personnel responsible for the medical management of radiation accidents. REAC/TS strengthens hospital preparedness for radiation emergencies by preparing and educating first responders, medical personnel and occupational health professionals who will provide care to patients with a radiation injury or illness. REAC/TS staff provide medical advice,

224

Risk management  

SciTech Connect

In the autumn of 1993 an incident occurred with a diving support vessel, whereby a live pipeline from a NAM gas production platform, situated in the Dutch sector of the North Sea, was considerably displaced. Key element in the repair of the line was to identify potential hazards involved in various remedial scenarios and to manage the associated risks.

Visser, M. [Nederlandse Aardolie Maatschappij, Velsen (Netherlands)

1995-12-31T23:59:59.000Z

225

LANL responds to radiological incident  

NLE Websites -- All DOE Office Websites (Extended Search)

LANL responds to radiological incident LANL responds to radiological incident LANL responds to radiological incident Multiple tests indicate no health risks to public or employees. August 27, 2012 Aerial view of the Los Alamos Neutron Science Center(LANSCE). Aerial view of the Los Alamos Neutron Science Center (LANSCE). The contamination poses no danger to the public. The Laboratory is investigating the inadvertent spread of Technetium 99 by employees and contractors at the Lujan Neutron Scattering Center August 27, 2012-The Laboratory is investigating the inadvertent spread of Technetium 99 by employees and contractors at the Lujan Neutron Scattering Center at the Los Alamos Neutron Science Center (LANSCE), a multidisciplinary accelerator facility used for both civilian and national security research. The Laboratory has determined that about a dozen people

226

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

227

Definition: Angle of incidence | Open Energy Information  

Open Energy Info (EERE)

Angle of incidence Angle of incidence Jump to: navigation, search Dictionary.png Angle of incidence In reference to solar energy systems: the angle a ray of sun makes with a line perpendicular to a surface; for example, a surface directly facing the sun has an angle of incidence of zero, and a surface parallel to the sun (such as a sunrise striking a horizontal rooftop) has an angle of incidence of 90°. Sunlight with an incident angle of 90° tends to be absorbed, while lower angles tend to be reflected.[1][2] View on Wikipedia Wikipedia Definition Angle of incidence is a measure of deviation of something from "straight on", for example: in the approach of a ray to a surface, or the angle at which the wing or horizontal tail of an airplane is installed on the fuselage, measured relative to the axis of the fuselage.

228

Review of NASA's Computer Security Incident Detection and Handling Capability (IG-12-017, August 7, 2012)  

E-Print Network (OSTI)

Review of NASA's Computer Security Incident Detection and Handling Capability (IG-12-017, August 7, 2012) The NASA Office of Inspector General (OIG) conducted an audit to evaluate the effectiveness with which NASA's Security Operations Center (SOC) manages the Agency's computer security incident detection

229

ORISE: The Medical Aspects of Radiation Incidents  

NLE Websites -- All DOE Office Websites (Extended Search)

discussed in The Medical Aspects of Radiation Incidents are: basic health physics and dose estimation (US and SI units) treatment of whole body and acute local irradiation issues...

230

ORISE: Incident Management Training Put to Test in Gulf  

NLE Websites -- All DOE Office Websites (Extended Search)

Deepwater Horizon disaster On April 20, 2010, an explosion on the Deepwater Horizon oil rig in the Gulf of Mexico killed 11 people and touched off a massive offshore oil...

231

Recent Developments in Field Response for Mitigation of Radiological Incidents  

Energy.gov (U.S. Department of Energy (DOE))

Recent Developments in Field Response for Mitigation of Radiological Incidents Carlos Corredor*, Department of Energy ; Charley Yu, Argonne National Labs Abstract: Since September 11, 2001, there has been a large effort by the government to develop new methods to reduce the consequence of potential radiological incidents. This is evident in the enhancement of technologies and methods to detect, prepare, or manage radiological incidents or accidents . With any radiological accident, radiological dispersal device (RDD), or improvised nuclear device (IND) , the major focus is always on the immediate phase of an incident or accident and less centered on the intermediate phase and the late recovery phase of that incident. In support of the 2008 protective action guides(PAGs) for RDDs , established by the Department of Homeland Security and by agreement with the EPA, the White House requested establishment of a series of operational guidelines that would focus on efforts during all phases of the incident and not just the immediate phase. Operational Guidelines were developed for this purpose. The operational guidelines are dose based pre-derived levels of radioactivity or radionuclide concentrations in various media that can be measured in the field and compared to the PAGs to quickly determine if protective actions are warranted. I.e can certain roads, bridges or metro systems be used, can the public return to their homes or businesses, can the public consume certain foods, etc. An operational guidelines manual, developed by a federal interagency working group led by the Department of Energy (DOE), was published in 2009 as the Preliminary Report on Operational Guidelines Developed for Use in Emergency Response to a Radiological Dispersal Device Incident, with its companion software RESidual RADiation (RESRAD)-RDD. With the development of the new PAG Manual (Interim Final 2013) by the EPA, an interagency working group was created under the auspices of the ISCORS to develop a revised operational guidelines manual that would reflect the changes by EPAs new PAG Manual, new best available technology based on new dosimetric models (ICRP 60+), include operational guidelines for INDs and increase the amount of radionuclides in the OGT Manual from 11 radioisotopes to 55. The new manual is scheduled for publication in 2015.

232

Dynamic detection of nuclear reactor core incident  

Science Journals Connector (OSTI)

Surveillance, safety and security of evolving systems are a challenge to prevent accident. The dynamic detection of a hypothetical and theoretical blockage incident in the Phenix nuclear reactor is investigated. Such an incident is characterized by abnormal ... Keywords: Contrast, Dynamic detection of perturbations, Evolving system, Fast-neutron reactor, Neighbourhood, Noise

Laurent Hartert; Danielle Nuzillard; Jean-Philippe Jeannot

2013-02-01T23:59:59.000Z

233

Incident Report An incident report should be submitted for any event involving  

E-Print Network (OSTI)

Incident Report An incident report should be submitted for any event involving: injury or illness fire explosion or implosion chemical exposure Minor cuts and scrapes need not be reported be reported. If a "near miss" might have had severe consequences, submit an incident report. You may also

Crawford, T. Daniel

234

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

235

General surface equations for glancing incidence telescopes  

Science Journals Connector (OSTI)

A generalized set of equations are derived for two mirror glancing incidence telescopes using Fermats principle, a differential form of the law of reflection, the generalized sine...

Saha, Timo T

1987-01-01T23:59:59.000Z

236

Women @ Energy: Cereda Amos | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cereda Amos Cereda Amos Women @ Energy: Cereda Amos March 14, 2013 - 4:23pm Addthis Cereda Amos joined the Department of Energy, Office of the Chief Information Officer in October of 2011 as the Joint Cybersecurity Coordination Center (JC3) Program Manager and was brought on board to work on the development phase of JC3. Cereda Amos joined the Department of Energy, Office of the Chief Information Officer in October of 2011 as the Joint Cybersecurity Coordination Center (JC3) Program Manager and was brought on board to work on the development phase of JC3. Cereda Amos joined the Department of Energy, Office of the Chief Information Officer in October of 2011 as the Joint Cybersecurity Coordination Center (JC3) Program Manager and was brought on board to work on the development phase of JC3. Prior to that, Cereda was with the

237

Establishing and operating an incident response team  

SciTech Connect

Occurrences of improprieties dealing with computer usage are on the increase. They range all the way from misuse by employees to international computer telecommunications hacking. In addition, natural disasters and other disasters such as catastrophic fires may also fall into the same category. These incidents, like any other breach of acceptable behavior, may or may not involve actual law breaking. A computer incident response team should be created as a first priority. This report discusses the establishment and operation of a response team.

Padgett, K.M.

1992-09-01T23:59:59.000Z

238

Establishing and operating an incident response team  

SciTech Connect

Occurrences of improprieties dealing with computer usage are on the increase. They range all the way from misuse by employees to international computer telecommunications hacking. In addition, natural disasters and other disasters such as catastrophic fires may also fall into the same category. These incidents, like any other breach of acceptable behavior, may or may not involve actual law breaking. A computer incident response team should be created as a first priority. This report discusses the establishment and operation of a response team.

Padgett, K.M.

1992-01-01T23:59:59.000Z

239

Novel applications of data mining methodologies to incident databases  

E-Print Network (OSTI)

Incident databases provide an excellent opportunity to study the repeated situations of incidents in the process industry. The databases give an insight into the situation which led to an incident, and if studied properly can help monitor...

Anand, Sumit

2006-08-16T23:59:59.000Z

240

Managing Faults in the Service Delivery Process of Service Provider Coalitions Patricia Marcu  

E-Print Network (OSTI)

that consolidates and supports inter- organizational incident management and probabilistic model for fault discovery high quality IT services with maximum efficiency and dependability. Incident and Problem Management to identify. To facilitate localization and resolution of an incident, an inter-organizational ITSM (io

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Computerized Accident/Incident Reporting System  

NLE Websites -- All DOE Office Websites (Extended Search)

Accident Recordkeeping and Reporting Accident Recordkeeping and Reporting Accident/Incident Recordkeeping and Reporting CAIRS logo Computerized Accident Incident Reporting System CAIRS Database The Computerized Accident/Incident Reporting System is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE operations. Injury and Illness Dashboard The Dashboard provides an alternate interface to CAIRS information. The initial release of the Dashboard allows analysis of composite DOE-wide information and summary information by Program Office, and site. Additional data feature are under development. CAIRS Registration Form CAIRS is a Government computer system and, as such, has security requirements that must be followed. Access to the

242

Management Plan Management Plan  

E-Print Network (OSTI)

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

243

FM032_r1_0_Incident Report.doc 03/04/09 CNS Incident Report Form  

E-Print Network (OSTI)

FM032_r1_0_Incident Report.doc 03/04/09 CNS Incident Report Form Incident Information Date and Time Instructions on reverse #12;FM032_r1_0_Incident Report.doc 03/04/09 FM032 Instructions 1. This form. This form is not a substitute for other reporting obligations including University Injury reports. #12;

244

Electrically floating, near vertical incidence, skywave antenna  

DOE Patents (OSTI)

An Electrically Floating, Near Vertical Incidence, Skywave (NVIS) Antenna comprising an antenna element, a floating ground element, and a grounding element. At least part of said floating ground element is positioned between said antenna element and said grounding element. The antenna is separated from the floating ground element and the grounding element by one or more electrical insulators. The floating ground element is separated from said antenna and said grounding element by one or more electrical insulators.

Anderson, Allen A.; Kaser, Timothy G.; Tremblay, Paul A.; Mays, Belva L.

2014-07-08T23:59:59.000Z

245

Hospitality Management Hospitality Management  

E-Print Network (OSTI)

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

246

Catastrophic Incident Recovery: Long-Term Recovery from an Anthrax Event Symposium  

SciTech Connect

On March 19, 2008, policy makers, emergency managers, and medical and Public Health officials convened in Seattle, Washington, for a workshop on Catastrophic Incident Recovery: Long-Term Recovery from an Anthrax Event. The day-long symposium was aimed at generating a dialogue about restoration and recovery through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems.

Lesperance, Ann M.

2008-06-30T23:59:59.000Z

247

Tunable, oblique incidence resonant grating filter for telecommunications  

Science Journals Connector (OSTI)

We have designed a tunable, oblique-incidence resonant grating filter that covers the C band as an add-drop device for incident TE-polarized light. We tune the filter by tilting a...

Niederer, Guido; Herzig, Hans Peter; Shamir, Joseph; Thiele, Hans; Schnieper, Marc; Zschokke, Christian

2004-01-01T23:59:59.000Z

248

EM-Led Radiological Incident Response Program Receives Honors...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EM-Led Radiological Incident Response Program Receives Honors EM-Led Radiological Incident Response Program Receives Honors May 29, 2014 - 12:00pm Addthis Jessie Welch performs...

249

Hazardous Materials Incident Response Procedure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hazardous Materials Incident Response Procedure Hazardous Materials Incident Response Procedure Hazardous Materials Incident Response Procedure The purpose of this procedure is to provide guidance for developing an emergency response plan, as outlined in OSHA's 29 CFR 1910.120(q), for facility response. This model has been adopted and applied to work for response to transportation accidents involving radioactive material or other hazardous materials incidents Hazardous Materials Incident Response Procedure.docx More Documents & Publications Handling and Packaging a Potentially Radiologically Contaminated Patient Decontamination Dressdown at a Transportation Accident Involving Radioactive Material Medical Examiner/Coroner on the Handling of a Body/Human Remains that are Potentially Radiologically Contaminated

250

Evaluation of Incident Risks in a Repository for Radioactive Waste  

SciTech Connect

A probabilistic safety assessment of the operation phase of a repository for radioactive waste requires the knowledge of incident risks. These are evaluated from generic observations. The present method accounts for the uncertainty (1) of whether an incident occurs, (2) of the incident rate, (3) of the duration of generic observation, and (4) of the duration of operation phase of the repository. It yields a mean risk and its standard deviation from a minimum of generic data, comprising only the number of observed incidents and the duration of the observation, as more comprehensive generic data are seldom available. It was shown that incidents sharing a common generic observation must be either merged together to a total incident or the generic observation must be split up in sub-observations, one for each such incident. The method was tested on the example of the German Konrad repository for low-level waste in a deep geological formation. (authors)

Grundler, D.; Mariae, D.; Muller, W.; Boetsch, W. [Institut fur Sicherheitstechnologie (ISTec), Koln (Germany); Thiel, J. [Bundesamt fur Strahlenschutz (BfS), Salzgitter (Germany)

2008-07-01T23:59:59.000Z

251

Updated fracture incidence rates for the US version of FRAX  

E-Print Network (OSTI)

presenting with non-vertebral fractures. Osteoporos Int 18:2006) Epidemiology of vertebral fractures: implications forORIGINAL ARTICLE Updated fracture incidence rates for the US

Ettinger, B.; Black, D. M.; Dawson-Hughes, B.; Pressman, A. R.; Melton, L. J.

2010-01-01T23:59:59.000Z

252

Model Recovery Procedure for Response to a Radiological Transportation Incident  

Energy.gov (U.S. Department of Energy (DOE))

This Transportation Emergency Preparedness Program (TEPP) Model Recovery Procedure contains the recommended elements for developing and conducting recovery planning at transportation incident scene...

253

Use of incident databases for cause and consequence analysis and national estimates  

E-Print Network (OSTI)

stored in existing databases can lead to useful conclusions and reduction of chemical incidents and consequences of incidents. An incident database is a knowledge based system that can give an insight to the situation which led to an incident. Effective...

Obidullah, A.S.M.

2007-04-25T23:59:59.000Z

254

ORISE: National Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Emergency Management Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is Making a Difference Overview Exercises and Planning Training and Technology Support Resources How to Work With Us Contact Us Oak Ridge Institute for Science Education National Security and Emergency Management The Oak Ridge Institute for Science and Education (ORISE) helps prepare the U.S. Department of Energy's (DOE) emergency response assets, as well as those of other federal and state agencies, by managing and conducting programs, studies, research, exercises and training. ORISE's national security and emergency management capabilities include: Providing incident response where weapons of mass destruction and/or improvised explosive devices are involved

255

Incident involving UCSD student(s) takes place. UCSD STUDENT  

E-Print Network (OSTI)

Incident involving UCSD student(s) takes place. UCSD STUDENT CONDUCT PROCESS for individual students (updated 9/20/11) The Office of Student Conduct receives an incident report (i.e. RA, RSO, UCSD Police, student/faculty/staff complaint, etc). If sufficient evidence is present to support a violation

Russell, Lynn

256

Abstract B17: Health disparities in brain cancer incidence  

Science Journals Connector (OSTI)

...GA Abstract B17: Health disparities in brain cancer incidence Emanuela Taioli 1 Wenqi...reported that US black patients have lower brain cancer rates than whites, and this has...Gregory J. Riggins. Health disparities in brain cancer incidence. [abstract]. In...

Emanuela Taioli; Wenqi Gan; Gregory J. Riggins

2014-11-01T23:59:59.000Z

257

Unified Resolve 2014: A Proof of Concept for Radiological Support to Incident Commanders  

Energy.gov (U.S. Department of Energy (DOE))

Unified Resolve 2014: A Proof of Concept for Radiological Support to Incident Commanders Daniel Blumenthal*, U.S. Department of Energy ; John Crapo, Oak Ridge Institute for Science and Education; Gerard Vavrina, U.S. Department of Energy; Katharine McLellan McLellan, U.S. Department of Energy; Michael J. Gresalfi, Oak Ridge National Laboratory Abstract: In response to a radiological or nuclear (R/N) emergency, Incident Command and the associated response community will require requisite technical expertise, and the application of appropriate decision-support tools, and derivative products in order to effectively manage response operations. Unlike the spectrum of natural disasters which occur with some frequency, and which our nations first responder community has great familiarity with, an emergency that includes an R/N element, whether initiated by an accidental or manmade event, is at best an infrequent occurrence and generally not an operational emergency response experience most of our nations regional, state and local first responder communities have participated in. The Unified Resolve 2014 annual exercise, conducted by the National Capital Region's Incident Management Team (NCR IMT) during March, 2014, provided the U.S. Department of Energys Office of Emergency Response with an ideal opportunity to pilot and asses a proposed R/N operational support position, designed to provide state and local incident command with technical subject matter expertise within both the planning and operational elements of both area and unified command. This proposed cadre of R/N technical specialists, volunteers willing to support their home regions state and local incident commands when facing an R/N emergency, are presently referred to as Radiological Operations Support Specialists (ROSS). The role of the ROSS cadre is envisioned to be an on-scene R/N subject matter expert to Incident Command, to provide both adaptive planning support and operational advice, with respect to a wide range of R/N modeling, measurement, and analysis capabilities, decision-tools and products available from across the Federal community, to include both DOE, EPA and others. The ROSS cadre would include personnel who are already radiation professionals, to include health physicists and others. They would receive additional training in the specifics of radiological emergency response. The skills include knowing what Federal assets are available to help local responders, how do the data and modeling products provided by these Federal assets support local decision making, and how do the radiological issues impact or complicate local decision making. The exercise helped to define the role of this specialist, additional training required, and the types of data products needed by incident management personnel. The goal is to develop a nationwide cadre of local experts who can immediately support the local response to a radiological incident before any Federal expertise has time to arrive.

258

A probabilistic safety analysis of incidents in nuclear research reactors  

Science Journals Connector (OSTI)

......errors, computational models (software), management, communication, safety culture, plant ageing, maintenance...Energy Power Plants Probability Radiation Monitoring Radiation Protection Radioactive Hazard Release Safety Management...

Valdir Maciel Lopes; Gian Maria Agostinho Angelo Sordi; Mauricio Moralles; Tufic Madi Filho

2012-06-01T23:59:59.000Z

259

Personnel Accountability for Non-COOP Incidents | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Accountability for Non-COOP Incidents Responsible Contacts Bruce Murray HR Policy Advisor E-mail bruce.murray@hq.doe.gov Phone 202-586-3372 More Documents & Publications...

260

Vitamin D and Cancer IncidenceResponse to Grant  

Science Journals Connector (OSTI)

...September 2014 letter Letters to the Editor Vitamin D and Cancer Incidence-Letter from Grant William B. Grant * * Corresponding Author: William B. Grant, Sunlight, Nutrition, and Health Research Center, P.O. Box 641603, San Francisco...

Tea Skaaby; Lise Lotte Nystrup Husemoen; Allan Linneberg

2014-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A probabilistic safety analysis of incidents in nuclear research reactors  

Science Journals Connector (OSTI)

......System for Research Reactor (IRSRR). Available...System for Research Reactor (IRSRR). Available...76. 7 Manual on reliability data collection for research reactor PSAs. (1992) IAEA...probabilistic safety analysis of incidents in nuclear......

Valdir Maciel Lopes; Gian Maria Agostinho Angelo Sordi; Mauricio Moralles; Tufic Madi Filho

2012-06-01T23:59:59.000Z

262

SP 800-61 Rev. 1. Computer Security Incident Handling Guide  

Science Journals Connector (OSTI)

Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only more numerous and diverse but also more damaging and disruptive. An incident response capability ... Keywords: Computer security incident, incident handling, incident response, threats, vulnerabilities

Karen A. Scarfone; Timothy Grance; Kelly Masone

2008-03-01T23:59:59.000Z

263

Program Managers  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Managers Program Managers Enabling remarkable discoveries and tools that transform our understanding of energy and matter and advance national, economic, and energy...

264

Service management solutions To support your IT objectives  

E-Print Network (OSTI)

asset management tools, a service desk takes longer to handle service requests and resolve incidents a common platform for bringing people, processes and technology Highlights Help service desk technicians Imagine how tightly knit service desk and asset management capabilities could help optimize service

265

Conference Management  

Directives, Delegations, and Requirements

To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

1999-11-03T23:59:59.000Z

266

A comprehensive analysis of natural gas distribution pipeline incidents  

Science Journals Connector (OSTI)

The objective of this paper is to provide a reference database for pipeline companies and/or regulators with an investigation of safety performance of US natural gas distribution pipelines. With a total of 3,679 natural gas distribution pipeline incidents between 1985 and 2010, nine safety indicators are statistically analysed in terms of the year, pipeline length, regions, pipeline diameter, pipeline wall thickness, material, age, incident area and incident cause to identify the relationship between safety indicators and various variables. Overall average frequencies of incidents, injuries and fatalities between 1985 and 2009 are 0.0846/1,000 mile-years, 0.0407/1,000 mile-years, and 0.0094/1,000 mile-years respectively. The analysis shows that the safety performance of US natural gas distribution pipeline is improving over time, and different variables have different impact on safety performances. However, the number of annual incidents does not show a significant decline due to increasing energy demand. [Received: March 21 2012; Accepted: July 15 2012

Zhenhua Rui; Xiaoqing Wang

2013-01-01T23:59:59.000Z

267

2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

268

E-Print Network 3.0 - action real-time grazing-incidence Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

operation... ) 12;Grazing Incidence Pumping (GRIP) Target optimum gain region On-axis x-ray laser Preformed plasma1... ps Grazing Incidence Pumping ... Source: Wang, Wei Hua -...

269

Effect of directional dependency of wall reflectivity and incident concentrated solar flux on the efficiency of a cavity solar receiver  

Science Journals Connector (OSTI)

Abstract Managing the optical properties of a cavity solar receiver to create spectral and directional selectivities is a solution to improve receiver efficiencies. A reduction in the incident solar power lost by reflection and by emission in a solar receiver allows the absorption of the solar flux to be maximized. This report investigates the influence of the cavity walls directional reflectivity on the thermal radiative efficiency of a cubic cavity solar receiver. A Monte Carlo ray-tracing method is used to calculate the power lost by reflections and by emission with respect to the incident radiation angular distribution and the bidirectional reflectance distribution function of the cavity walls. To study the influence of the directional dependency of the incident flux on the radiative efficiency, four patterns are considered: collimated, diffuse, focused, and Themis incidences. The directional-hemispherical reflectivity for the bottom wall (face to aperture) and lateral walls are distinguished. For diffuse walls, the absorption efficiency is primarily affected by the lateral walls reflectivity because of the back reflection losses. For specular walls, the driving parameter is the bottom wall reflectivity. In addition, the radiative efficiency with thermal emission was studied for the Themis configuration and a slightly weakest dependency of the efficiency on the lateral walls reflectivity was found.

Florent Larrouturou; Cyril Caliot; Gilles Flamant

2014-01-01T23:59:59.000Z

270

Thyroid cancer incidence in relation to volcanic activity  

SciTech Connect

Environmental or genetic factors are sought to explain the high incidence of thyroid cancer in Iceland. At present, it is impossible to cite any environmental factor, particularly one related to the volcanic activity in the country, which could explain the high incidence of thyroid cancer in Iceland. However, the thyroid gland in Icelanders is very small due to the high intake of iodine from seafood. It is, therefore, easier for physicians to find thyroid tumors. Furthermore, genetic factors are very likely to be of great importance in the small, isolated island of Iceland.

Arnbjoernsson, E.A.; Arnbjoernsson, A.O.; Olafsson, A.

1986-01-01T23:59:59.000Z

271

Nuclear accident and incident public affairs (pa) guidance  

SciTech Connect

This Directive reissues reference (a) DoD Directive 5230.16 to update DoD policy, responsibilities, and procedures for the prompt release of information to the public in the interest of public safety, and to prevent public alarm in the event of accidents or significant incidents involving nuclear weapons or nuclear components, radioactive material, nuclear weapon launch or transport vehicles (when a nuclear weapon is aboard), or nuclear reactors under DoD control. It updates DoD policy, responsibilities, and procedures during an improvised nuclear device (IND) incident.

Not Available

1993-12-20T23:59:59.000Z

272

Emergency Management Program, Brookhaven National Laboratory, BNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Management Homepage Emergency Management Mike Venegoni, Manager Brookhaven National Laboratory Bldg. 860 - P.O. Box 5000 Upton, NY 11973-5000 (631) 344-7280 E-mail: mvenegoni@bnl.gov Emergency Management Program Brookhaven National Laboratory :: Fire Danger Index - LOW The Fire Danger Index level takes into account current and antecedent weather, fuel types, and both live and dead fuel moisture. ▪ Index Description (pdf) ▪ NWS Fire Weather Forecast :: Important Information EMERGENCY Numbers Offsite: 631-344-2222 ▪ Emergency Services ▪ Hurricane Awareness :: Be Alert, Be Aware! Watch out for unattended bags/packages and report any unusual or suspicious incidents immediately to Police Headquarters by calling: 631-344-2222 The mission of the Emergency Management Program at Brookhaven National Laboratory is provide the framework for development, coordination, control, and direction of all emergency planning, preparedness, readiness assurance, response, and recovery actions.

273

Management Responsibilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Responsibilities Management Responsibilities Depleted UF6 Management Responsibilities DOE has responsibility for safe and efficient management of approximately 700,000 metric tons of depleted UF6. Organizational Responsibilities In the United States, the U.S. Department of Energy is responsible for managing all the depleted uranium that has been generated by the government and has been declared surplus to national defense needs. In addition, as a result of two memoranda of agreement that have been signed between the DOE and USEC, the DOE has assumed management responsibility for approximately 145,000 metric tons of depleted UF6 that has been or will be generated by USEC. Any additional depleted UF6 that USEC generates will be USEC's responsibility to manage. DOE Management Responsibility

274

Skin cancer detection by oblique-incidence diffuse reflectance spectroscopy  

E-Print Network (OSTI)

Skin cancer is the most common form of cancer and it is on the rise. If skin cancer is diagnosed early enough, the survival rate is close to 90%. Oblique-incidence diffuse reflectance (OIR) spectroscopy offers a technology that may be used...

Smith, Elizabeth Brooks

2009-05-15T23:59:59.000Z

275

Violation of Laws, Losses, and Incidents of Security Concerns  

Directives, Delegations, and Requirements

To set forth Department of Energy (DOE) procedures to assure timely and effective action relating to violations of criminal, laws, loses, and incidents of security concern to DOE. Cancels DOE O 5631.5. Canceled by DOE O 470.1 of 9-28-1995.

1992-09-15T23:59:59.000Z

276

Bifurcation analysis of an epidemic model with nonlinear incidence  

Science Journals Connector (OSTI)

In this paper, we consider an epidemic model with the nonlinear incidence of a sigmoidal function. By mathematical analysis, it is shown that the model exhibits the bistability and undergoes the Hopf bifurcation and the Bogdanov-Takens bifurcation. By ... Keywords: Bistability, Homoclinic, Limit cycle, Sensitive, Sigmoidal

Guihua Li, Wendi Wang

2009-08-01T23:59:59.000Z

277

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Guidance to someone by E-mail Share Federal Energy Management Program: Energy Management Guidance on Facebook Tweet about Federal Energy Management Program: Energy Management Guidance on Twitter Bookmark Federal Energy Management Program: Energy Management Guidance on Google Bookmark Federal Energy Management Program: Energy Management Guidance on Delicious Rank Federal Energy Management Program: Energy Management Guidance on Digg Find More places to share Federal Energy Management Program: Energy Management Guidance on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Energy Management Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal

278

Environmental Management Waste Management Facility (EMWMF) at...  

Office of Environmental Management (EM)

Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Full Document and Summary Versions...

279

INVESTMENT MANAGEMENT OFFICE MANAGEMENT OFFICE  

E-Print Network (OSTI)

INVESTMENT MANAGEMENT OFFICE INVESTMENT MANAGEMENT OFFICE THE UNIVERSITY OF UTAH University of Utah | Investment Management Office Quarterly Summary The Endowment Pool had a positive first quarter (ending March gain from investments of $7.8 million. The Endowment Pool unit value of $100 has grown to $175 in 10

280

Dental radiology considerations in DVI incidents: A review  

Science Journals Connector (OSTI)

Multiple fatality incidents frequently have a significant forensic dental identification component. The use of radiographs, that provide objective evidence of the dentition prior to and after death is a vital part of the reconciliation procedure. Although these events share some common elements, every multiple fatality incident response has its own idiosyncrasies that require both flexibility and advance planning. The focus, from a post mortem perspective, is the making of excellent, permanent, and archival-quality images. The post mortem plan should have a capability for conventional film-based and digital imaging. Additionally, images should be produced in a radiobiologically responsible manner using optimum body-substance precautions. Finally, images (both ante mortem and post mortem) must be held in a secure fashion at a distance, protected from further hazard.

R.E. Wood; S.L. Kogon

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Incident Energy Dependence of pt Correlations at RHIC  

SciTech Connect

We present results for two-particle transverse momentum correlations, ({Delta}p{sub t,i}{Delta}p{sub t,j}), as a function of event centrality for Au+Au collisions at {radical}s{sub NN} = 20, 62, 130, and 200 GeV at the Relativistic Heavy Ion Collider. We observe correlations decreasing with centrality that are similar at all four incident energies. The correlations multiplied by the multiplicity density increase with incident energy and the centrality dependence may show evidence of processes such as thermalization, jet production, or the saturation of transverse flow. The square root of the correlations divided by the event-wise average transverse momentum per event shows little or no beam energy dependence and generally agrees with previous measurements at the Super Proton Synchrotron.

Adams, J.; Aggarwal, M.M.; Ahammed, Z.; Amonett, J.; Anderson,B.D.; Arkhipkin, D.; Averichev, G.S.; Badyal, S.K.; Bai, Y.; Balewski,J.; Barannikova, O.; Barnby, L.S.; Baudot, J.; Bekele, S.; Belaga, V.V.; Bellwied, R.; Berger, J.; Bezverkhny, B.I.; Bharadwaj, S.; Bhasin, A.; Bhati, A.K.; Bhatia, V.S.; Bichsel, H.; Billmeier, A.; Bland, L.C.; Blyth, C.O.; Bonner, B.E.; Botje, M.; Boucham, A.; Brandin, A.V.; Bravar,A.; Bystersky, M.; Cadman, R.V.; Cai, X.Z.; Caines, H.; Calderon de laBarca Sanchez, M.; Castillo, J.; Cebra, D.; Chajecki, Z.; Chaloupka, P.; Chattopadhyay, S.; Chen, H.F.; Chen, Y.; Cheng, J.; Cherney, M.; Chikanian, A.; Christie, W.; Coffin, J.P.; Cormier, T.M.; Cramer, J.G.; Crawford, H.J.; Das, D.; Das, S.; de Moura, M.M.; Derevschikov, A.A.; Didenko, L.; Dietel, T.; Dogra, S.M.; Dong, W.J.; Dong, X.; Draper, J.E.; Du, F.; Dubey, A.K.; Dunin, V.B.; Dunlop, J.C.; Dutta Mazumdar, M.R.; Eckardt, V.; Edwards, W.R.; Efimov, L.G.; Emelianov, V.; Engelage, J.; Eppley, G.; Erazmus, B.; Estienne, M.; Fachini, P.; Faivre, J.; Fatemi,R.; Fedorisin, J.; Filimonov, K.; Filip, P.; Finch, E.; Fine, V.; Fisyak,Y.; Fomenko, K.; Fu, J.; Gagliardi, C.A.; Gaillard, L.; Gans, J.; Ganti,M.S.; Gaudichet, L.; Geurts, F.; Ghazikhanian, V.; Ghosh, P.; Gonzalez,J.E.; Grachov, O.; Grebenyuk, O.; Grosnick, D.; Guertin, S.M.; Guo, Y.; Gupta, A.; Gutierrez, T.D.; Hallman, T.J.; Hamed, A.; Hardtke, D.; Harris, J.W.; Heinz, M.; Henry, T.W.; Hepplemann, S.; Hippolyte, B.; Hirsch, A.; Hjort, E.; Hoffmann, G.W.; Huang, H.Z.; Huang, S.L.; Hughes,E.W.; Humanic, T.J.; Igo, G.; Ishihara, A.; Jacobs, P.; Jacobs, W.W.; Janik, M.; Jiang, H.; Jones, P.G.; Judd, E.G.; Kabana, S.; Kang, K.; Kaplan, M.; Keane, D.; Khodyrev, V.Yu.; Kiryluk, J.; Kisiel, A.; Kislov,E.M.; Klay, J.; Klein, S.R.; Koetke, D.D.; Kollegger, T.; Kopytine, M.; Kotchenda, L.; Kramer, M.; Kravtsov, P.; Kravtsov, V.I.; Krueger, K.; Kuhn, C.; Kulikov, A.I.; Kumar, A.; Kutuev, R.Kh.; et al.

2005-04-29T23:59:59.000Z

282

Federal Energy Management Program: Computerized Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Computerized Maintenance Management Systems to someone by E-mail Share Federal Energy Management Program: Computerized Maintenance Management Systems on Facebook Tweet about Federal Energy Management Program: Computerized Maintenance Management Systems on Twitter Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Google Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Delicious Rank Federal Energy Management Program: Computerized Maintenance Management Systems on Digg Find More places to share Federal Energy Management Program: Computerized Maintenance Management Systems on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

283

LRRB Pavement Management Systems Pavement Management Systems  

E-Print Network (OSTI)

LRRB Pavement Management Systems Pavement Management Systems Presented by: Michael Marti SRF for implementing and monitoring research results (RIC) #12;LRRB Pavement Management Systems LRRB Structure LRRB Current Pavement Management System Used ICON (Goodpointe) Year of Pavement Management System

Minnesota, University of

284

SUBCONTRACT MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-1 -1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish, document, and maintain adequate purchasing systems. 2. To ensure contractors flow down contract requirements to subcontractors. WHY IS SUBCONTRACT MANAGEMENT IMPORTANT? In many Department prime contracts a significant portion of the obligated dollars is spent on subcontract work. Due to the absence of a direct contractual relationship with the subcontractor, the Department must rely on the prime contractor to manage subcontract work. Subcontractors perform significant work efforts at sites and are an integral part of the site's success. Prime

285

Program Manager  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will participate in a wide spectrum of program and project management activities involving systems engineering and integration support for Defense Programs...

286

Water Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Management This department applies multi-disciplinary science and technology-based modeling to assess complex environmental systems. It integrates ecology, anthropology, and...

287

Position Management  

Directives, Delegations, and Requirements

The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

1992-06-23T23:59:59.000Z

288

MANAGEMENT (MNG)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and recommendations is adequately implemented. (DOE Order 414.1A, Criterion 3; 10 CFR 830, Subpart A) Approach Record Review * Review the SWS issues management systems and...

289

Training Management Information System  

SciTech Connect

The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

Rackley, M.P.

1989-01-01T23:59:59.000Z

290

DEACTIVATION MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the Overall End-State  Viewing Deactivation in Two Phases  Early Decisions  Early Deactivation Tasks  Facility-Specific Commitments  Hazard Reduction  Detailed End-Points  Set Up Method and Criteria  Post-Deactivation S&M Plan

291

BachelorofManagement InternationalManagement  

E-Print Network (OSTI)

on the official transcript (see Part 11 - Faculty of Management in the 2007/2008 Calendar). Program Planning Guide Management 3050/Political Science 3420 - Human Resource Management Management 3061 - Information Systems Environment Management 3640 - Cross-Cultural Management Practices Management 3660/Geography 3225 - Industrial

Seldin, Jonathan P.

292

Pap test use and cervical cancer incidence in First Nations women living in Manitoba  

Science Journals Connector (OSTI)

...special-property>author-choice Pap test use and cervical cancer incidence in First Nations...Sciences, University of Manitoba This study examined Pap test utilization, Pap test results, and cervical cancer incidence among First...

Kathleen M. Decker; Alain A. Demers; Erich V. Kliewer; Natalie Biswanger; Grace Musto; Brenda Elias; Jane Griffith; Donna Turner

293

Predicting scorpion sting incidence in an endemic region using climatological variables*  

E-Print Network (OSTI)

Predicting scorpion sting incidence in an endemic region using climatological variables* G. CHOWELL in Mexico. We analysed the significance of climatological variables to predict the incidence of scorpion seasonal pattern that correlates to climatological variables. An increase in scorpion activity

Chowell, Gerardo

294

Radiological accident and incident in Thailand: lesson to be learned  

Science Journals Connector (OSTI)

......was transported to a safe storage at the OAEP (Figure-3...the 137Cs source to a safety storage at the Radioactive Waste Management Center, Thailand...including instructions relating to long-term storage or disposition, had been......

Nanthavan Ya-anant; Kanokrat Tiyapun; Kittiphong Saiyut

2011-07-01T23:59:59.000Z

295

A preliminary evaluation of a speed threshold incident detection algorithm  

E-Print Network (OSTI)

detection algorithm. San Antonio's new traffic management center, TransGuide, uses a new speed based algorithm, The TXDOT (Texas Department of Transportation) Speed algorithm. This research compares the TXDOT Speed algorithm with California algorithm #8...

Kolb, Stephanie Lang

1996-01-01T23:59:59.000Z

296

Active and Knowledge-based Process Safety Incident Retrieval System  

E-Print Network (OSTI)

topics saved for quick access. The database search system developed in this research is similar to that of CCPS-PSID in the way that it offers folder search and word search. However, the PSID has a single level of folders (keyword list... maximum of four levels. Moreover, word search within a folder has also been included for the search system, which further improves searching capabilities. 5 Some of the existing incident databases that are open to public or accessible by Mary Kay O...

Khan, Sara Shammni

2011-10-21T23:59:59.000Z

297

Cancer incidence in areas with elevated levels of natural radiation  

Science Journals Connector (OSTI)

It has been reported that on reaching a certain level of cell damage the production of repair enzymes is triggered which decreases the chromosome aberrations. If this happens, prolonged exposure to high levels of natural radiation in areas with elevated levels of background radiation could decrease the frequency of chromosome aberrations. Recent epidemiological studies indicated that there is an increased risk of cancer in healthy individuals with high levels of chromosomal aberrations. Studies performed in Nordic countries as well as Italy, showed that increased levels of chromosome aberrations in lymphocytes can be used to predict cancer risk in humans. One may conclude that a dose of ionising radiation sufficient to produce a certain level of cell damage increases production of antioxidants and repair enzymes that decrease either the frequency of chromosome aberrations or the cancer risk. People in some areas of Ramsar, a city in northern Iran, receive an annual radiation dose from background radiation that is more than five times higher than the 20 mSv. Yr-1 that is permitted for radiation workers. Inhabitants of Ramsar have lived for many generations in these high background areas. If an annual radiation dose of a few hundred mSv is detrimental to health, causing genetic abnormalities or an increased risk of cancer, it should be evident in these people. The absorbed dose rate in some high background radiation areas of Ramsar is approximately 55-200 times higher than that of the average global dose rate. It has been reported that 3??8% of all cancers are caused by current levels of ionising radiation. If this estimation were true, all the inhabitants of such an area with extraordinary elevated levels of natural radiation would have died of cancer. Our cytogenetic studies show no significant differences between people in the high background area compared to people in normal background areas. As there was no increased level of chromosome aberrations, it may be predicted that the cancer incidence is not higher than in the neighbouring areas with a normal background radiation level. Although there is not yet solid epidemiological information, most local physicians in Ramsar report anecdotally that there is no increase in the incidence rates of cancer or leukemia in their area. There are no data to indicate a significant increase of cancer incidence in other high background radiation areas (HBRAs). Furthermore, several studies show a significant decrease of cancer death rates in areas with high backgrounds. It can be concluded that prolonged exposure to high levels of natural radiation possibly triggers processes such as the production of antioxidants and repair enzymes, which decreases the frequency of chromosome aberrations and the cancer incidence rate.

S.M.J. Mortazavi; M. Ghiassi-Nejad; P.A. Karam; T. Ikushima; A. Niroomand-Rad; J.R. Cameron

2006-01-01T23:59:59.000Z

298

Studies on transmission and incidence of Trypanosoma theileri, Laveran 1902  

E-Print Network (OSTI)

vector. c) Ingestion of the insect vector. Sane evidence of intrauterirm transmission has been provided by several researchers. Dirc)anan, Manthei and Frank (1957) found T. theileri in the stanach of an ~ bovine fetus. Iundholm, Stors and Mc... were infected with T. theileri; the 2 calves were free fran infectian. Kohl-Yakimoff, Yakimoff and 13e)censky (1913) in Saint Peters- bourg, Russia, examined 14 cattle for T. theileri and faund a 35. 6rr incidence of infecticnr in another survey...

Betancourt Echeverry, Antonio

1972-01-01T23:59:59.000Z

299

Incidence of Childhood Obesity in the United States  

Science Journals Connector (OSTI)

...stratified the estimates of prevalence and incidence according to sex, quintile of the kindergartners' household socioeconomic status, and race or ethnic group (non-Hispanic white, non-Hispanic black, Hispanic, or "other"). To understand the importance of weight early in life, we also stratified the data according... According to this report, nearly half of children who became obese between the ages of 5 and 14 years had been overweight and 75% had been above the 70th percentile for BMI at the start of kindergarten. Focusing on early childhood obesity may be important in stemming the epidemic.

Cunningham S.A.Kramer M.R.Narayan K.M.V.

2014-01-30T23:59:59.000Z

300

A study of the relationship between emotional history and the incidence of cancer in human subjects  

E-Print Network (OSTI)

SUBJECTS' CRITICAL INCIDENTS 55 APPENDIX D - SUMMARIES OF NON-CANCER 72 SUBJECTS' CRITICAL INCIDENTS APPENDIX E - RELEASE FORM 87 VITA 89 LIST OF TABLES Table Page B iographical Data of Sub j ects in Sample 10 Statistical Analysis of Data 22... Number of Critical Incidents and Final Evaluations in Non-Cancer Subjects 23 Number of Critical Incidents and Final Evaluations in Cancer Subjects 24 LIST OF FIGURES Figure Page Emotionality Rating Scale 20 Relation between Ego Defenses, Level...

Sebastian, Henry Andrew

1972-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Immobilization Research Immobilization Research Kurt Gerdes U.S. DOE, Office of Engineering and Technology John Vienna Pacific Northwest National Laboratory Environmental Management May 19, 2009 2009 Hanford - Idaho - Savannah River Technical Exchange 2 Objectives Perform research and development to advance the waste stabilization technology options by through closely- coupled theory, experimentation, and modeling Develop solutions for Hanford, Idaho, Savannah River, and Oak Ridge wastes challenges (along with facilitating management of future wastes) Environmental Management General Approach Balance between near-term incremental technology improvements and long-term transformational solutions Address the requirements for high risk waste streams - high-level tank waste (RPP, SRS)

302

ION GNSS 2004, Sept. 21-24, Long Beach, CA Automated Traffic Incident Detection with GPS  

E-Print Network (OSTI)

in Intelligent Transportation Systems (ITS) and in-vehicle telematics systems. ABSTRACT Traffic congestion can. Traffic Incident Detection Systems (IDS) use a variety of technologies to detect incidents so system for traffic incident detection. The system performance analysis was conducted using a combination

Calgary, University of

303

Weekly Security Incident Log Period of Jun 24 -Jun 30, 2013  

E-Print Network (OSTI)

his drinking water bottle had been tampered with while it was left unattended. Toronto Police were. The vehicle driver left the scene without reporting the incident. 6/26/2013 10:13 AM Motor Vehicle Incident rear quarter panel. No injuries were reported. 6/26/2013 07:07 PM Motor Vehicle Incident 2013

304

Weekly Security Incident Log Period of Jun 2 -Jun 8, 2014  

E-Print Network (OSTI)

. A description of a suspect was obtained. 6/4/2014 06:39 PM Theft, Under 2014-000979 ROSS BUILDING - NORTH TOWERWeekly Security Incident Log Period of Jun 2 - Jun 8, 2014 Incident No. Reported Date Building Name lot. No injuries were reported. 6/2/2014 06:19 PM Motor Vehicle Incident 2014-000960 TECHNOLOGY

305

Weekly Security Incident Log Period of Nov 27 -Dec 2, 2012  

E-Print Network (OSTI)

was obtained. 11/28/2012 01:41 PM Suspicious Person 2012-002119 ROSS BUILDING - NORTH TOWER Private PropertyWeekly Security Incident Log Period of Nov 27 - Dec 2, 2012 Incident No. Reported Date Building:41 AM Theft, Under Weekly Security Incident Log Printed: 12/3/2012 3:18:11 PM 1 Period of Nov 27 - Dec 2

306

ORISE: DeepwaterHorizon and Nuclear & Radiological Incidents  

NLE Websites -- All DOE Office Websites (Extended Search)

Wi l l i a m H a l e y Wi l l i a m H a l e y B r a d P o t t e r C o mm o n C h a l l e n g e s a n d S o l u t i o n s J u n e 2 0 1 1 D e e p w a t e r H o r i z o n a n dN u c l e a r & R a d i o l o g i c a l I n c i d e n t s The 2010 Deepwater Horizon oil spill shares many of the same challenges associated with a radiological incident like the one considered in the Empire 09 1 exercise or even a much larger nuclear incident. By analyzing experiences during Deepwater Horizon, these challenges can be identified by the interagency in advance of a radiological or nuclear emergency and solutions made available. Establishing and staffing a UnifiEd Command strUCtUrE The demands of Deepwater Horizon challenged the traditional response construct envisioned by national planning systems.

307

ALLIANCE MANAGEMENT  

Science Journals Connector (OSTI)

In the last two decades, production and manufacturing management has rapidly adopted a range of new concepts: manufacturing strategy, focused factory, just-in-time manufacturing, concurrent engineering, total ...

2000-01-01T23:59:59.000Z

308

Stormwater Management  

E-Print Network (OSTI)

management program must be developed that would meet the standard of reducing pollutants to the maximum extent practicable. Stormwater management programs for medium and large MS4s include measures to: ? Identify major outfalls and pollutant loadings... seeding: The vegetation used will be part of final landscaping, but during construction it prevents soil erosion. ? Mulching: Materials such as hay, grass, woodchips, gravel, or straw are placed on top of the soil to keep it from eroding. Structural...

Jaber, Fouad

2008-10-23T23:59:59.000Z

309

SMITH NORMAL FORMS OF INCIDENCE MATRICES Abstract. A brief introduction is given to the topic of Smith normal forms of incidence  

E-Print Network (OSTI)

SMITH NORMAL FORMS OF INCIDENCE MATRICES PETER SIN Abstract. A brief introduction is given to the topic of Smith normal forms of incidence matrices. A general discussion of techniques is illustrated, the fundamental invariant is the Smith normal form of A, whose definition we now recall. A square integer matrix

Sin, Peter

310

Simulation of heavy ion induced electron yield at grazing incidence  

Science Journals Connector (OSTI)

We compare simulations to experiments measuring electron yield from heavy ions striking metal surfaces, in particular at grazing incidence, for 1.0MeV potassium and 182.0MeV gold ions striking stainless steel as measured in two recent experiments. We find the electron yield is proportional to within 3% for the potassium experiments and 13% for the gold experiments to the simulated energy deposited by the ions in a thin (?20???) layer at the target surface. We discuss how nonequilibrium stopping and ion wake fields may account for the larger disagreement with the gold experiments. An analytic estimate based on specular reflection predicts the peak in simulated and measured electron yield as a function of angle to within a few percent.

P. H. Stoltz; S. Veitzer; R. Cohen; A. W. Molvik; J.-L. Vay

2004-10-12T23:59:59.000Z

311

Managing the Management: CORBAbased Instrumentation of Management Systems  

E-Print Network (OSTI)

Management Team Department of Computer Science, TU M? unchen Arcisstr. 21, D­80333 Munich, Germany akeller approach to this problem by defining a MIB for manage­ ment systems. It can be regarded as a step towardsManaging the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network

312

Incidents of Travel in China and Tibet Jerry R. Hobbs  

E-Print Network (OSTI)

at Dulles Airport. It turned out we were on the same plane flying from Washington back to San Francisco. I International about ten years ago, not as I do in the Artificial Intelligence Center, but in the management't really believe it would happen until I saw her at the airport. She gave me several books, including

Hobbs, Jerry R.

313

Incident and Hazard Reporting and Investigation Procedure Category: Campus Life  

E-Print Network (OSTI)

: (a) serious injury/illness or dangerous goods/hazardous substances must be reported to Health Management 1. LEGISLATION/ENTERPRISE AGREEMENT/POLICY SUPPORTED Health & Safety Policy Occupational Safety and Health Act, 1984 Occupational Safety and Health Regulations, 1996 2. IMPLEMENTATION PRINCIPLES 2

314

Managing Solutions  

E-Print Network (OSTI)

tx H2O | pg. 19 Texas Water Resources Institute (TWRI) project managers work together with scientists and educators as well as government funding agencies to address water quality and quantity issues in Texas. Each of TWRI?s five project... the funds.? Gregory began his role at TWRI in 2006 upon com- pletion of a master?s degree in water management and hydrological science at Texas A&M University. A former Mills Scholar, Gregory was familiar with TWRI. He saw that the institute...

Baker, Emily

2007-01-01T23:59:59.000Z

315

LTS Project Management - Hanford Site  

NLE Websites -- All DOE Office Websites (Extended Search)

Transition LTS Execution Project Management Planning Resource Management Reporting Interface Management Communications (InternalExternal) Information Management Records...

316

OIA: Office of Contract Assurance: Assurance Systems: Issues Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Issues Management Program Issues Management Program Overview The Lawrence Berkeley National Laboratory (LBNL) Issues Management Program encompasses issue identification, causal analysis, corrective action development, tracking and implementation, and corrective action verification of completion and validation of effectiveness. The program also includes monitoring and analysis of adverse trends and conditions, and sharing of lessons learned and best practices. The issues that are relevant to this program pertain to any safety or operational event, condition, or circumstance that: results or could result in injury, damage, loss, or noncompliance (Example: actual or near miss incidents); represents a program, safety or operational deficiency (Example: audit or assessment finding, performance weakness); or

317

Data Management Policy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Management Policy Data Management Policy The data management resource information and data release policies below are provided to help researchers understand the data...

318

Object Management Systems  

E-Print Network (OSTI)

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

319

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts...

320

Environmental Management System Plan  

E-Print Network (OSTI)

R-3 Environmental Management System Plan References 30.of Energy, Safety Management System Policy, DOE P 450.4 (E), Environmental Management Systems ? Requirements with

Fox, Robert

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Neutron scattering by rough surfaces at grazing incidence  

Science Journals Connector (OSTI)

There are a number of calculations in the literature of the effect of statistical surface roughness on the specular and diffuse scattering of neutrons and x rays which impinge on surfaces at grazing incidence. These calculations do not agree with one another and in some cases lack internal consistency. In this paper I show that these discrepancies can be resolved within the distorted-wave Born approximation. The result I obtain for the specular reflectivity is the widely used version of Nevot and Croce, while that for the diffuse scattering is the same as a recent calculation by Sinha, Sirota, Garoff, and Stanley. The approximations made by Nevot and Croce are clearly revealed by the distorted-wave Born approximation. A simple numerical algorithm is proposed for the calculation of diffuse scattering from a surface whose roughness is self-affine, and the form of the scattering is calculated for a range of parameters within this model. The calculation of diffusion scattering is extended in this paper to the case of films with rough surfaces. Correlation between roughness at the two film surfaces is considered and shown to be important for the description of neutron reflectivity data obtained with a thin film of titanium deposited on a sapphire substrate.

Roger Pynn

1992-01-01T23:59:59.000Z

322

Interferometric results from the Boeing grazing incidence FEL ring resonator  

Science Journals Connector (OSTI)

The Boeing HAP (High Average Power) experiment was reconfigured throughout 19891990 to incorporate a grazing incidence, 133 m round-trip ring resonator. Initial spectra, mode stability, coherence length, and interferometric wavefront quality measurements have been taken. This paper reports on the optical measurement techniques and data used to characterize the resonator optical output as having an optical path difference (OPD) of 2.0 to 2.5 optical wavelengths. A basic data-reduction methodology and analysis supporting the subtraction of effects caused by the 7 beam reducer, fold mirrors, and the radial shear interferometer itself Noteworthy observations, such as the ability to overlay interferometric fringe data over the length of a macropulse (? 180 micropulses) without destroying the fringe visibility, and the occurrence of centrally localized (? 30% of the diameter) disturbances of the fringe pattern are also discussed. Coherence length measurements, made using the interferometer, showed the coherence length to be between 64 and 120 ?m. Attempts to measure the micropulse-to-micropulse mode stability were made and are discussed as well.

D.A. Byrd; S.C. Bender; E.L. Miller; D.H. Dowell

1992-01-01T23:59:59.000Z

323

Federal Energy Management Program: Best Management Practice: Cooling Tower  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooling Tower Management to someone by E-mail Cooling Tower Management to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Google Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Delicious Rank Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

324

Federal Energy Management Program: Best Management Practice: Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Management Planning to someone by E-mail Water Management Planning to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water Management Planning on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Water Management Planning on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Google Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Delicious Rank Federal Energy Management Program: Best Management Practice: Water Management Planning on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Water Management Planning on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

325

Managing Critical Management Improvement Initiatives  

Directives, Delegations, and Requirements

Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

2003-10-01T23:59:59.000Z

326

The incidence and prevalence of hypertension in the Province of Quebec.  

E-Print Network (OSTI)

??The objectives of this study were to estimate the prevalence, incidence and lifetime risk of developing hypertension after a given age in the Province of (more)

Valle, Michel.

2008-01-01T23:59:59.000Z

327

E-Print Network 3.0 - annual cancer incidence Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Powered by Explorit Topic List Advanced Search Sample search results for: annual cancer incidence Page: << < 1 2 3 4 5 > >> 1 aallll IIrreell aanndd ccaanncceerr...

328

E-Print Network 3.0 - analysing healthcare incident Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

, many of the telemedicine incidents reported to MAUDE demonstrate that ... Source: Johnson, Chris - Department of Computing Science, University of Glasgow Collection: Computer...

329

Environmental Management  

SciTech Connect

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2014-11-12T23:59:59.000Z

330

Environmental Management  

ScienceCinema (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2015-01-07T23:59:59.000Z

331

Best Management Practice #1: Water Management Planning  

Energy.gov (U.S. Department of Energy (DOE))

A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

332

Contract Management Certificate Program  

E-Print Network (OSTI)

Contract Management Certificate Program Accelerate Your Career BusinessandManagement extension bearing the UC seal signifies a well- known, uncompromising standard of academic excellence. #12;Contract Management Certificate Program UC Irvine Extension's Contract Management Certificate Program focuses on core

Rose, Michael R.

333

Your Records Management Responsibilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Your Records Management Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your job. This pamphlet explains your responsibilities for federal records and provides the context for understanding records management in the federal government and in the Department of Energy. TOP RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT

334

Integrated Safety Management Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTEGRATED SAFETY INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS ACRONYMS................................................................................................................................................................v EXECUTIVE SUMMARY .........................................................................................................................................1

335

Cancer incidences in Europe related to mortalities, and ethnohistoric, genetic, and  

E-Print Network (OSTI)

Cancer incidences in Europe related to mortalities, and ethnohistoric, genetic, and geographic We have previously shown that geographic differences in cancer mortalities in Europe are related of 45 male and 47 female cancers. Differences in cancer incidences are correlated moder- ately, first

Rosenberg, Michael S.

336

Eur J Cancer. Author manuscript Social inequalities in cancer incidence and cancer survival: Lessons from  

E-Print Network (OSTI)

Eur J Cancer. Author manuscript Page /1 5 Social inequalities in cancer incidence and cancer ( ). With regards to cancer risk, a first comprehensive review of socioeconomic inequalities was1 published by IARC in 1997 ( ). This review covered inequalities in cancer mortality, incidence and survival and discussed

Paris-Sud XI, Université de

337

Childhood leukaemia incidence below the age of 5 years near French nuclear power plants  

E-Print Network (OSTI)

Childhood leukaemia incidence below the age of 5 years near French nuclear power plants D Laurier 1 living in the vicinity of nuclear power plants in Germany. We present herein results about the incidence of childhood leukaemia in the vicinity of nuclear power plants in France for the same age range. These results

Paris-Sud XI, Université de

338

The low energy ion assisted control of interfacial structure: ion incident angle eects  

E-Print Network (OSTI)

The low energy ion assisted control of interfacial structure: ion incident angle eects X.W. Zhou *, H.N.G. Wadley Department of Materials Science and Engineering, School of Engineering and Applied atomistic modeling of normal incident angle ion impacts with model Ni/Cu/Ni multilayer surfaces have

Wadley, Haydn

339

ROYAL HOLLOWAY, UNIVERSITY OF LONDON ACCIDENT/INCIDENT INVESTIGATION AND REPORTING  

E-Print Network (OSTI)

on employers to thoroughly investigate such occurrences and having done so, to take appropriate remedial actionROYAL HOLLOWAY, UNIVERSITY OF LONDON ACCIDENT/INCIDENT INVESTIGATION AND REPORTING PROCEDURE in the investigations or take the lead role on behalf of the College. #12;SECTION 1 Accident/Incident Investigation

Sheldon, Nathan D.

340

Weekly Security Incident Log Period of May 27 -Jun 2, 2013  

E-Print Network (OSTI)

/30/2013 02:37 PM Emergency Medical 2013-000958 ROSS BUILDING - NORTH TOWER Subject not Identified SecurityWeekly Security Incident Log Period of May 27 - Jun 2, 2013 Incident No. Reported Date Building and a Facilities Electrician responded to a report that a lamp standard on the north side of the William Small

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

forthcoming in Economic Letters Incidence of Federal and State Gasoline Taxes  

E-Print Network (OSTI)

forthcoming in Economic Letters Incidence of Federal and State Gasoline Taxes Hayley Chouinarda, Berkeley, and member of the Giannini Foundation. Abstract The federal specific gasoline tax falls equally incidence of state taxes is greater in states that use relatively little gasoline. Author Keywords: Taxes

Perloff, Jeffrey M.

342

Characterization of X-UV multilayers by grazing incidence X-ray reflectometry  

E-Print Network (OSTI)

1675 Characterization of X-UV multilayers by grazing incidence X-ray reflectometry L. Nevot, B of the performance at other wavelengths appears rather doubtful. We show how grazing incidence X-ray reflectometry], microelectronics [3], neutron optics [4] and X-UV optics [5]. In the last case, the stacks are made of alternating

Boyer, Edmond

343

Energy management  

SciTech Connect

This paper is a review of the Department of Energy's (DOE) Contractor Purchasing System Review (CPSR) Program, which oversees the extensive subcontracting activities of the Department's management and operating (M and O) contractors. This review is part of a special GAO audit effort to help ensure that areas vulnerable to fraud, waste, abuse, and mismanagement are identified and that adequate corrective actions are taken. This effort focuses on 16 areas, one of which is DOE contractor oversight. This report describes the subcontracting deficiencies occurring at DOE, identifies shortcomings in DOE's CPSR Program, and discusses the corrective actions that DOE has committed to take in its CPSR Program in response to these findings.

Glenn, J.

1991-10-01T23:59:59.000Z

344

Status Update on the NCRP Scientific Committee SC 5-1 Report: Decision Making for Late-Phase Recovery from Nuclear or Radiological Incidents - 13450  

SciTech Connect

In August 2008, the U.S. Department of Homeland Security (DHS) issued its final Protective Action Guide (PAG) for radiological dispersal device (RDD) and improvised nuclear device (IND) incidents. This document specifies protective actions for public health during the early and intermediate phases and cleanup guidance for the late phase of RDD or IND incidents, and it discusses approaches to implementing the necessary actions. However, while the PAG provides specific guidance for the early and intermediate phases, it prescribes no equivalent guidance for the late-phase cleanup actions. Instead, the PAG offers a general description of a complex process using a site-specific optimization approach. This approach does not predetermine cleanup levels but approaches the problem from the factors that would bear on the final agreed-on cleanup levels. Based on this approach, the decision-making process involves multifaceted considerations including public health, the environment, and the economy, as well as socio-political factors. In an effort to fully define the process and approach to be used in optimizing late-phase recovery and site restoration following an RDD or IND incident, DHS has tasked the NCRP with preparing a comprehensive report addressing all aspects of the optimization process. Preparation of the NCRP report is a three-year (2010-2013) project assigned to a scientific committee, the Scientific Committee (SC) 5-1; the report was initially titled, Approach to Optimizing Decision Making for Late- Phase Recovery from Nuclear or Radiological Terrorism Incidents. Members of SC 5-1 represent a broad range of expertise, including homeland security, health physics, risk and decision analysis, economics, environmental remediation and radioactive waste management, and communication. In the wake of the Fukushima nuclear accident of 2011, and guided by a recent process led by the White House through a Principal Level Exercise (PLE), the optimization approach has since been expanded to include off-site contamination from major nuclear power plant accidents as well as other nuclear or radiological incidents. The expanded application under the current guidance has thus led to a broadened scope of the report, which is reflected in its new title, Decision Making for Late-Phase Recovery from Nuclear or Radiological Incidents. The NCRP report, which is due for publication in 2013, will substantiate the current DHS guidance by clarifying and elaborating on the processes required for the development and implementation of procedures for optimizing decision making for late-phase recovery, enabling the establishment of cleanup goals on a site-specific basis. The report will contain a series of topics addressing important issues related to the long-term recovery from nuclear or radiological incidents. Special topics relevant to supporting the optimization of the decision-making process will include cost-benefit analysis, radioactive waste management, risk communication, stakeholder interaction, risk assessment, and decontamination approaches and techniques. The committee also evaluated past nuclear and radiological incidents for their relevance to the report, including the emerging issues associated with the Fukushima nuclear accident. Thus, due to the commonality of the late-phase issues (such as the potential widespread contamination following an event), the majority of the information pertaining to the response in the late-phase decision-making period, including site-specific optimization framework and approach, could be used or adapted for use in case of similar situations that are not due to terrorism, such as those that would be caused by major nuclear facility accidents or radiological incidents. To ensure that the report and the NCRP recommendations are current and relevant to the effective implementation of federal guidance, SC 5-1 has actively coordinated with the agencies of interest and other relevant stakeholders throughout the duration of the project. The resulting report will be an important resource to guide those involved

Chen, S.Y. [Environmental Science Division, Argonne National Laboratory, 9700 South Cass Avenue, Argonne, IL 60439 (United States)] [Environmental Science Division, Argonne National Laboratory, 9700 South Cass Avenue, Argonne, IL 60439 (United States)

2013-07-01T23:59:59.000Z

345

M E Environmental Management Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

safety  performance  cleanup  closure safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D Program 2013 Edition U.S. Department Of Energy safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management 3/13/2013 The American Recovery and Reinvestment Act of 2009

346

Energy management  

SciTech Connect

In January 1990 GAO began implementing a special audit effort to help ensure that areas vulnerable to fraud, waste, abuse, and mismanagement are identified and that appropriate corrective actions are taken. This effort focuses on 16 areas, one of which is the Department of Energy's (DOE) contracting practices. As part of this effort, the authors determined if contract audits for monitoring and overseeing DOE's contracting process were being performed and that we identify the impact or potential impact to the government when contract audits were not performed. Specifically, this paper discusses audit coverage of DOE's management and operating (M and O) contractors and DOE contracts, the problems that may occur when contract audit activity is not performed, and factors that have impeded contract audit coverage.

Dingell, J.D.

1991-10-01T23:59:59.000Z

347

Overview - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Help > Data Management Help > Data Management Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Overview Welcome to the data management pages for data providers to the ORNL Distributed Active Archive (DAAC). These pages provide an overview of data management planning and preparation and offer practical methods to successfully share and archive your data. Plan - write a short data management plan while preparing your research proposal, Manage - assign logical, descriptive file names, define the contents of your data files, and use consistent data values when preparing

348

FIRE MANAGEMENT PLAN MONTAGUE PLAIN  

E-Print Network (OSTI)

FIRE MANAGEMENT PLAN FOR MONTAGUE PLAIN WILDLIFE MANAGEMENT AREA #12;Fire Management Plan for Montague Plain Wildlife Management Area prepared for Massachusetts Dept. of Fisheries, Wildlife. 2003. Fire Management Plan for Montague Plain Wildlife Management Area. Department of Natural Resources

Schweik, Charles M.

349

Chemical Management (Vol. 2 of 3)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

i i TS DOE-HDBK-1139/2-2006 AUGUST 2006 DOE HANDBOOK CHEMICAL MANAGEMENT (Volume 2 of 3) Chemical Safety and Lifecycle Management U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE DOE-HDBK-1139/2-2006 ii Available on the Department of Energy Technical Standards Program Web site http://standards.doe.gov DOE-HDBK-1139/2-2006 iii Foreword During the last several years, the Department of Energy (DOE) complex has averaged one chemical incident per day. DOE considers this rate to be unacceptable. In an effort to address

350

Waste Management | Department of Energy  

Energy Savers (EERE)

Management Waste Management Oak Ridge has an onsite CERCLA disposal facility, the Environmental Management Waste Management Facility, that reduces cleanup and transportation costs....

351

Load Management for Industry  

E-Print Network (OSTI)

In the electric utility industry, load management provides the opportunity to control customer loads to beneficially alter a utility's load curve Load management alternatives are covered. Load management methods can be broadly classified into four...

Konsevick, W. J., Jr.

1982-01-01T23:59:59.000Z

352

Fuel Tax Incidence in Developing Countries: The Case of Costa Rica | Open  

Open Energy Info (EERE)

Tax Incidence in Developing Countries: The Case of Costa Rica Tax Incidence in Developing Countries: The Case of Costa Rica Jump to: navigation, search Name Fuel Tax Incidence in Developing Countries: The Case of Costa Rica Agency/Company /Organization Resources for the Future Sector Energy Focus Area Conventional Energy Topics Finance, Market analysis, Background analysis Resource Type Lessons learned/best practices Website http://www.rff.org/RFF/Documen Country Costa Rica UN Region Latin America and the Caribbean References Fuel Tax Incidence in Developing Countries: The Case of Costa Rica[1] Abstract "Although fuel taxes are a practical means of curbing vehicular air pollution, congestion, and accidents in developing countries-all of which are typically major problems-they are often opposed on distributional

353

Predictors of Weapon Use in Domestic Violence Incidents Reported to Law Enforcement  

Science Journals Connector (OSTI)

The studys aim was to determine the predictors of weapon use during domestic violence incidents that were...N...?=?369) from the San Diego County Sheriffs department comprised the study sample. The predictor va...

Poco Kernsmith; Sarah W. Craun

2008-10-01T23:59:59.000Z

354

Hospital response for children as a vulnerable population in radiological/nuclear incidents  

Science Journals Connector (OSTI)

......hospital's response to a nuclear or radiological emergency...Stronger links between nuclear medicine programs and...operations and preparedness policies need to include paediatric...Infectious Disease. Policy statement: chemical-biological...population in radiological/nuclear incidents. | Emergency......

Brenda Conway; Jordan Pike

2010-11-01T23:59:59.000Z

355

E-Print Network 3.0 - alcohols caries incidence Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Student Summary: incident of a similar nature. 4.6 Amnesty for Multiple Alcohol-Related Medical Emergencies (a) For those... This Policy provides that any student who is in need...

356

Cancer Incidence in First Generation U.S. Hispanics: Cubans, Mexicans, Puerto Ricans, and New Latinos  

Science Journals Connector (OSTI)

2009 American Association for Cancer Research. August 2009 research-article Research Articles Cancer Incidence in First Generation U.S. Hispanics...for reprints: Paulo S. Pinheiro, Florida Cancer Data System, University of Miami School...

Paulo S. Pinheiro; Recinda L. Sherman; Edward J. Trapido; Lora E. Fleming; Youjie Huang; Orlando Gomez-Marin; David Lee

2009-08-01T23:59:59.000Z

357

The Step Roughening of the Cu(113) Surface: A Grazing Incidence X-Ray Scattering Study  

Science Journals Connector (OSTI)

In conjunction with the development of high brilliance synchrotron sources, the grazing incidence x-ray scattering (GIXS) technique is emerging as an important structural probe for surface and interface studies [...

K. S. Liang; E. B. Sirota; K. L. DAmico; G. J. Hughes

1988-01-01T23:59:59.000Z

358

Metalized Polyethylene Mulch to Reduce Incidence of Huanglongbing and Improve Growth of New Citrus Plantings  

E-Print Network (OSTI)

7.14 P Metalized Polyethylene Mulch to Reduce Incidence ofNorth, Immokalee, FL, USA Polyethylene mulch was evaluatedUV reflective low density polyethylene mulch metalized with

Croxton, S.; Stansly, P.

2014-01-01T23:59:59.000Z

359

Towards a Learning Traffic Incident Detection System Tomas Singliar and Milos Hauskrecht  

E-Print Network (OSTI)

manual tuning. Our hypoth- esis is that these time-consuming solutions can be sucessfuly eliminated of sensor networks on US roadways. Incident detection systems (IDS) are complex arrange- ments

Hauskrecht, Milos

360

Analysis of randomly oriented structures by grazing-incidence small-angle neutron scattering  

Science Journals Connector (OSTI)

A formalism is presented which allows the quantitative evaluation of grazing-incidence small-angle neutron scattering patterns from randomly oriented one-dimensional paracrystal domains with lamellar structure.

Korolkov, D.

2012-03-15T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

A study of incidents involving programmable electronic safety-related systems  

Science Journals Connector (OSTI)

......from the analysis of the incidents studied. Hazard analysis techniques such as HAZOP or failure mode and effects analysis (FMEA) and fault-tree analysis (FTA). These methods help identify and analyse potential faults, failures and their causes......

C Chambers; P.R Croll; M Bowell

1999-06-01T23:59:59.000Z

362

Impact of polarization and incidence of the ASAR sensor on coastline mapping: example of Gabon  

Science Journals Connector (OSTI)

Coastline mapping is of great interest in many different applications. In this Letter, we analyse the effect of the polarization and the incidence angle of the new Advanced Synthetic Aperture Radar (ASAR) sensor on coastline detection. Results indicate ...

N. Baghdadi; R. Pedreros; N. Lenotre; T. Dewez; M. Paganini

2007-08-01T23:59:59.000Z

363

A study of incidents involving programmable electronic safety-related systems  

Science Journals Connector (OSTI)

......inadequate requirements specification, lack of safety...safety requirements specification Hardware a Design...safety requirements specification: caused by an inadequate...without sufficient thermal insulation. 3 Example incidents......

C Chambers; P.R Croll; M Bowell

1999-06-01T23:59:59.000Z

364

General formula for the incidence factor of a solar heliostat receiver system  

Science Journals Connector (OSTI)

A general formula is derived for the effective incidence factor of an array of heliostat mirrors for solar power collection. The formula can be greatly simplified for arrays of high...

Wei, Ling Y

1980-01-01T23:59:59.000Z

365

Assessing the Potential of Using Traffic Simulation Model Results for Evaluating Automatic Incident Detection Algorithms  

E-Print Network (OSTI)

Assessing the Potential of Using Traffic Simulation Model Results for Evaluating Automatic Incident of such a test-bed would be the ability to incorporate synthetic data produced by a simulation model since

Hellinga, Bruce

366

29.01.03.M1.09 Information Resources Incident Management Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network (OSTI)

, internet/intranet procedures, and acceptable use procedures. Definitions Information Resources (IR follow System Regulation 10.02.01, Control of Fraud, Waste and Abuse. 2.6 If there is a substantial

367

Federal Energy Management Program: Operations and Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Support to someone by E-mail Management Support to someone by E-mail Share Federal Energy Management Program: Operations and Maintenance Management Support on Facebook Tweet about Federal Energy Management Program: Operations and Maintenance Management Support on Twitter Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Google Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Delicious Rank Federal Energy Management Program: Operations and Maintenance Management Support on Digg Find More places to share Federal Energy Management Program: Operations and Maintenance Management Support on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

368

Investigation of lane occupancy as a freeway control parameter for use during incident conditions  

E-Print Network (OSTI)

parameters were used in the automatic control of' a freeway safety warning device. Two concepts, usir g measured lane occupancy foz the detection of' freeway incidents, were developed, . The f'irst concept was ter. . . cd critical occupancy... freeway safety warning device, using critical occupancy parameters, was developed and simulated in real-time. Evaluation of the simulated operation of the device revealed. that relia'cle detection of shock waves generated by freeway incidents...

Friebele, John Duncan

1972-01-01T23:59:59.000Z

369

Incident detection using the Standard Normal Deviate model and travel time information from probe vehicles  

E-Print Network (OSTI)

INCIDENT DETECTION USING THE STANDARD iNORMAL DEVIATE MODEL AND TRAVEL TECHIE INFORMATION FROM PROBE VEHICLES A Thesis by CHRISTOPHER EUGENE MOUNTAIN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment... of the requirement for the degree of MASTFR OF SCIENCE December 1993 Major Subject: Civil Engineering INCIDENT DETECTION USING THE STANDARD NORMAL DEVIATE MODEL AND TRAVEL TIME INFORMATION FROM PROBE VEHICLES A Thesis by CHRISTOPHER EUGENE MOUNTAIN Submitted...

Mountain, Christopher Eugene

2012-06-07T23:59:59.000Z

370

Records Management Specialist  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as a Records Management Specialist in the Richland Operations Office (RL), Assistant Manager for Mission Support (AMMS), Infrastructure, Services...

371

Renae Speck Commercialization Manager  

NLE Websites -- All DOE Office Websites (Extended Search)

Manager Renae Speck, Ph.D is a Commercialization Manager in the Office of Technology Transfer in the Partnership Directorate at the United States Department of Energy's Oak...

372

Workforce Management Office  

Office of Energy Efficiency and Renewable Energy (EERE)

The Workforce Management Office provides leadership, policy guidance, and technical advice to Office of Energy Efficiency and Renewable Energy (EERE) managers, supervisors, and employees on a broad...

373

Contract/Project Management  

Energy Savers (EERE)

1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

374

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2013 Target FY 2013 Final FY...

375

Project Management Methodology  

Energy.gov (U.S. Department of Energy (DOE))

The Project Management Coordination Office (PMCO) provides the tools and guidance necessary to ensure consistent and effective management oversight of performer performance and consolidated...

376

Project Management Coordination Office  

Energy.gov (U.S. Department of Energy (DOE))

The Project Management Coordination Office (PMCO) provides guidance, leadership, training, and tools to Office of Energy Efficiency and Renewable Energy (EERE) management and the field in the area...

377

Stormwater Management Program (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

Stormwater Management program of the Department of Environmental Protection's Bureau of Conservation and Restoration administers the rules and regulations for stormwater management for Pennsylvania...

378

Management of Nuclear Materials  

Directives, Delegations, and Requirements

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

2009-08-17T23:59:59.000Z

379

Sensitivity of fenestration solar gain to source spectrum and angle of incidence  

SciTech Connect

The solar heat gain coefficient (SHGC) is the fraction of solar radiant flux incident on a fenestration system entering a building as heat gain. In general it depends on both the angle of incidence and the spectral distribution of the incident solar radiation. In attempts to improve energy performance and user acceptance of high-performance glazing systems, manufacturers are producing glazing systems with increasing spectral selectivity. This poses potential difficulties for calculations of solar heat gain through windows based upon the use of a single solar spectral weighting function. The sensitivity of modern high-performance glazing systems to both the angle of incidence and the shape of the incident solar spectrum is examined using a glazing performance simulation program. It is found that as the spectral selectivity of the glazing system increases, the SHGC can vary as the incident spectral distribution varies. The variations can be as great as 50% when using several different representative direct-beam spectra. These include spectra having low and high air masses and a standard spectrum having an air mass of 1.5. The variations can be even greater if clear blue diffuse skylight is considered. It is recommended that the current broad-band shading coefficient method of calculating solar gain be replaced by one that is spectral based.

McCluney, W.R. [Florida Solar Energy Center, Cocoa, FL (United States)

1996-12-31T23:59:59.000Z

380

PROJECT MANAGEMENT PLANS Project Management Plans  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT PLANS MANAGEMENT PLANS Project Management Plans  Overview  Project Management Plan Suggested Outline Subjects  Crosswalk between the Suggested PMP Outline Subjects and a Listing of Project Planning Elements  Elements of Deactivation Project Planning  Examples From Project Management Plans Overview The purpose here is to assist project managers and project planners in creating a project plan by providing examples and pointing to information that have been successfully used by others in the past. Section 4.2 of DOE Guide 430.1-3, DEACTIVATION IMPLEMENTATION GUIDE discusses the content and purpose of deactivation project management plans. It is presented as a suggested outline followed by other potential subjects. For the convenience of readers, that information is repeated below.

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Federal Energy Management Program: Energy Management Requirements by Law  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Requirements by Law and Regulation to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Facebook Tweet about Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Twitter Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Google Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Delicious Rank Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Digg Find More places to share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on AddThis.com... Requirements by Subject Requirements by Regulation

382

Chemical Management Contacts  

Energy.gov (U.S. Department of Energy (DOE))

Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

383

telecommunications system management  

Science Journals Connector (OSTI)

Communications system management applied to telecommunications systems, facilities, equipment, and components. See communications system , comm...

2001-01-01T23:59:59.000Z

384

Career Map: Engineering Manager  

Energy.gov (U.S. Department of Energy (DOE))

The Wind Program's Career Map provides job description information for Engineering Manager positions.

385

PRC Contract Management Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

Contract Management Team Members, Including Roles and Responsibilities ... 3 Contracting Officer ......

386

Environmental Best Management Practices  

E-Print Network (OSTI)

Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

Liskiewicz, Maciej

387

LPP Risk Management Plan  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

History and Process History and Process Slide 2 M E Environmental Management Environmental Management History ◦ Current Baseline Process Overview ◦ Identification ◦ Simulation ◦ Management Successes & Challenges Slide 3 M E Environmental Management Environmental Management Current Baseline Risks ◦ 1 Week Risk Summit held week of August 4 th , 2008 Broad representation from all levels of Isotek, DOE, PTC, and outside consultants Focused on risk and opportunity identification Included risk description, assumptions, and triggers No quantification or analysis No restrictions, constraints, or filtering HQ provided facilitator Prescribed format and capture methodology Slide 4 M E Environmental Management Environmental Management Current Baseline Risks ◦ Risk Summit Results

388

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Management System Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email Managing our effects on the environment We are committed to protecting the environment while conducting our national security and energy-related missions. Laboratory Environmental Governing Policy What is the Environmental Management System? It covers every program in the Laboratory

389

Office of Resource Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Resource Management Resource Management Home Sub Offices › Business Operations › Information Management › Human Resources and Administration Mission and Functions HSS Standard Operating Practices (For Internal Users Only) HSS Subject Matter Experts and Functional Points of Contacts Contact Us HSS Logo Office of Resource Management Direct Report to the Chief Health, Safety and Security Officer Mission and Functions Mission The Office of Resource Management supports the infrastructure of the Office of Health, Safety and Security (HSS) by providing balanced, unbiased, technically competent, and customer focused services in the areas of: (1) Financial Management, including budget formulation and execution; (2) Procurement Management, including contract and credit card programs; (3) Information Management, including technology-based solutions and programs; (4) Quality Assurance; (5) Human Resources, including recruitment and retention programs; (6) Administrative Services, including property management, travel, and work space management; and; (7) Strategic and Program Planning including performance and efficiency measures.

390

An Evaluation of Departmental Radiation Oncology Incident Reports: Anticipating a National Reporting System  

Science Journals Connector (OSTI)

Purpose Systems to ensure patient safety are of critical importance. The electronic incident reporting systems (IRS) of 2 large academic radiation oncology departments were evaluated for events that may be suitable for submission to a national reporting system (NRS). Methods and Materials All events recorded in the combined IRS were evaluated from 2007 through 2010. Incidents were graded for potential severity using the validated French Nuclear Safety Authority (ASN) 5-point scale. These incidents were categorized into 7 groups: (1) human error, (2) software error, (3) hardware error, (4) error in communication between 2 humans, (5) error at the human-software interface, (6) error at the software-hardware interface, and (7) error at the human-hardware interface. Results Between the 2 systems, 4407 incidents were reported. Of these events, 1507 (34%) were considered to have the potential for clinical consequences. Of these 1507 events, 149 (10%) were rated as having a potential severity of ?2. Of these 149 events, the committee determined that 79 (53%) of these events would be submittable to a NRS of which the majority was related to human error or to the human-software interface. Conclusions A significant number of incidents were identified in this analysis. The majority of events in this study were related to human error and to the human-software interface, further supporting the need for a NRS to facilitate field-wide learning and system improvement.

Stephanie A. Terezakis; Kendra M. Harris; Eric Ford; Jeff Michalski; Theodore DeWeese; Lakshmi Santanam; Sasa Mutic; Hiram Gay

2013-01-01T23:59:59.000Z

391

Soft x ray/extreme ultraviolet images of the solar atmosphere with normal incidence multilayer optics  

SciTech Connect

The first high resolution Soft X-Ray/Extreme Ultraviolet (XUV) images of the Sun with normal incidence multilayer optics were obtained by the Standford/MSFC Rocket X-Ray Spectroheliograph on 23 Oct. 1987. Numerous images at selected wavelengths from 8 to 256 A were obtained simultaneously by the diverse array of telescopes flown on-board the experiment. These telescopes included single reflection normal incidence multilayer systems (Herschelian), double reflection multilayer systems (Cassegrain), a grazing incidence mirror system (Wolter-Schwarzschild), and hybrid systems using normal incidence multilayer optics in conjunction with the grazing incidence primary (Wolter-Cassegrain). Filters comprised of approximately 1700{Angstrom} thick aluminum supported on a nickel mesh were used to transmit the soft x ray/EUV radiation while preventing the intense visible light emission of the Sun from fogging the sensitive experimental T-grain photographic emulsions. These systems yielded high resolution soft x ray/EUV images of the solar corona and transition region, which reveal magnetically confined loops of hot solar plasma, coronal plumes, polar coronal holes, supergranulation, and features associated with overlying cool prominences. The development, testing, and operation of the experiments, and the results from the flight are described. The development of a second generation experiment, the Multi-Spectral Solar Telescope Array, which is scheduled to fly in the summer of 1990, and a recently approved Space Station experiment, the Ultra-High Resolution XUV Spectroheliograph, which is scheduled to fly in 1996 are also described.

Lindblom, J.F.

1990-01-01T23:59:59.000Z

392

The 2004 Ultrasonic Benchmark Problem - SDH Response Under Oblique Incidence: Measurements and Patch Element Model Calculations  

SciTech Connect

The 2004 ultrasonic benchmark problem requires models to predict, given a reference pulse waveform, the pulse echo response of cylindrical voids of various radii located in an elastic solid for various incidence angles of a transducer immersed in water. We present the results of calculations based on the patch element model, recently developed at CNDE, to determine the response of an SDH in aluminum for specific oblique incidence angles. Patch element model calculations for a scan across the SDH, involving a range of oblique incidence angles, are also presented. Measured pulse-echo scans involving the SDH response under oblique incidence conditions are reported. In addition, through transmission measurements involving a pinducer as a receiver and an immersion planar probe as a transmitter under oblique incidence conditions are also reported in a defect-free Aluminum block. These pinducer-based measurements on a defect-free block are utilised to characterize the fields at the chosen depth. Comparisons are made between predictions and measurements for the pulse-echo response of a SDH.

Krishnamurthy, C. V.; Shankar, M.; Vardhan, J. Vishnu [Centre for NonDestructive Evaluation, Indian Institute of Technology, Chennai, India 600 036 (India); Balasubramaniam, Krishnan [Department of Mechanical Engineering, Indian Institute of Technology, Chennai, India 600 036 (India)

2006-03-06T23:59:59.000Z

393

Policies and procedures to manage employee Internet abuse  

Science Journals Connector (OSTI)

Industry analysts estimate that billions of dollars in lost revenue were attributed to employee Internet abuse. Trends also suggest that lost job productivity and corporate liability have emerged as new workplace concerns due to growth of new online technologies and mobile computing. Such employee Internet misuse creates new management dilemmas on how to respond to incidences of such misuse as well poses network security risks and drains on network bandwidth. Within an organization, it is imperative to ensure that employees are using computing resources effectively and appropriately. Utilizing the previous literature in the field, this paper proposed a revised framework to manage employee Internet abuse. The former model proposed did not account for new digital media and recommended screening applicants for Internet addiction, using more of a clinical test than a job performance test. This new model describes both prevention and intervention methods to address incidents of online misuse in the workplace and refocuses hiring decisions into post-employment training. It also examines the new hiring concerns with the new iGeneration of college graduates and it examines how organizations should best utilize acceptable Internet use policies with clear methods of Internet monitoring to enforce that workers are complying with company policies. This paper also talks about the potential benefits of rehabilitation approaches to manage employees who abuse instead of terminating them to decrease job turnover and improve job retention. Implications for current management practices are also discussed.

Kimberly Young

2010-01-01T23:59:59.000Z

394

How can a particle absorb more than the light incident on it?  

Science Journals Connector (OSTI)

A particle can indeed absorb more than the light incident on it. Metallic particles at ultraviolet frequencies are one class of such particles and insulating particles at infrared frequencies are another. In the former strong absorption is associated with excitation of surface plasmons; in the latter it is associated with excitation of surfacephonons. In both instances the target area a particle presents to incident light can be much greater than its geometrical cross?sectional area. This is strikingly evident from the field lines of the Poynting vector in the vicinity of a small sphere illuminated by a plane wave.

Craig F. Bohren

1983-01-01T23:59:59.000Z

395

Federal Energy Management Program: Best Management Practice: Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

396

Federal Energy Management Program: Best Management Practice: Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Commercial Kitchen Equipment to someone by E-mail Commercial Kitchen Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Google Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Delicious Rank Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on AddThis.com... Sustainable Buildings & Campuses

397

Federal Energy Management Program: Best Management Practice: Alternate  

NLE Websites -- All DOE Office Websites (Extended Search)

Alternate Water Sources to someone by E-mail Alternate Water Sources to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Google Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Delicious Rank Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

398

Fusing Integration Test Management with Change Management  

E-Print Network (OSTI)

- 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

Perry, Dewayne E.

399

Procurement and Property Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Definitions Related to Pre-Qualification Questionnaire Definitions Related to Pre-Qualification Questionnaire SELECTION OF SAFE CONTRACTORS The following is an explanation of information required for Attachment II: Three sources of information provide ways for owners to evaluate the probable safety performance of prospective contractors: - Experience modification rates for workers' compensation insurance - OSHA incidence rates for recordable injuries and illnesses - Contractor safety attitudes and practices The reliability of OSHA incidence rates is solely dependent on judicious reporting by the employer, while the EMRs are established by independent rating bureaus. Although the EMR is a more objective measure than the OSHA incidence rate, there is a correlation between them. Both will indicate past safety performance.

400

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal laws and regulations related to energy management. General Guidance for Facilities Overview of Federal Energy Management Policy and Mandates: Guidance document outlining Federal energy management goals and requirements for Federal energy managers. Sustainability Requirement Crosswalk: Crosswalk of sustainability and energy goals and targets within executive orders and other statutes. Guidelines Establishing Criteria for Excluding Buildings from the Energy Performance Requirements of Section 543 of the National Energy Conservation Policy Act as Amended by the Energy Policy Act of 2005 (EPAct 2005): Guidelines that established criteria for exclusions from the energy performance requirement for a fiscal year or any Federal building or collection of Federal buildings within the statutory framework provided by the law.

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Program Planning & Management Forms (5000-5999) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Planning & Management Forms (5000-5999) Program Planning & Management Forms (5000-5999) Program Planning & Management Forms (5000-5999) DOE F 5160.1 (pdf) Reprogramming, Restructuring, and Appropriation Transfer Summary DOE F 5480.4 (pdf) Contractor Employee Occupational Safety or Health Complaint DOE F 5484.3 (pdf) Individual Accident/Incident Report DOE F 5484.4 (pdf) Tabulation of Work-Hours and Vehicle Usage, and Property Valuation DOE F 5500.2 (pdf) Operational Incident Report DOE F 5631.18 (pdf) Security Acknowledgement DOE F 5631.20 (fillable pdf) Request for Visit or Access Approval DOE F 5631.29 (pdf) Security Termination Statement DOE F 5631.34 (pdf) Data Report on Spouse/Cohabitant DOE F 5634.1 (pdf) Safeguards and Security Survey Report DOE F 5635.9 (pdf) Record of Destruction

402

Plan - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Plan Plan Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Plans NASA's Terrestrial Ecology Program now requires that each proposal include a Data Management Plan (DMP) of up to two pages. A DMP for a proposal is a brief document that outlines what you will do with your data during and after your research, to ensure your data will be safe, documented, and accessible now and in the future. A DMP - developed early and used throughout the research project - will increase research efficiency by making the data understandable and usable in the future and

403

Depleted Uranium Hexafluoride Management  

NLE Websites -- All DOE Office Websites (Extended Search)

for for DUF 6 Conversion Project Environmental Impact Statement Scoping Meetings November/December 2001 Overview Depleted Uranium Hexafluoride (DUF 6 ) Management Program DUF 6 EIS Scoping Briefing 2 DUF 6 Management Program Organizational Chart DUF 6 Management Program Organizational Chart EM-10 Policy EM-40 Project Completion EM-20 Integration EM-50 Science and Technology EM-31 Ohio DUF6 Management Program EM-32 Oak Ridge EM-33 Rocky Flats EM-34 Small Sites EM-30 Office of Site Closure Office of Environmental Management EM-1 DUF 6 EIS Scoping Briefing 3 DUF 6 Management Program DUF 6 Management Program * Mission: Safely and efficiently manage the DOE inventory of DUF 6 in a way that protects the health and safety of workers and the public, and protects the environment DUF 6 EIS Scoping Briefing 4 DUF 6 Inventory Distribution

404

Computerized Maintenance Management Systems  

Energy.gov (U.S. Department of Energy (DOE))

Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and maintenance (O&M) programs. The software automates most of the logistical functions performed by O&M staff.

405

Managing Director Buildings, Transportation  

E-Print Network (OSTI)

Site Development Will Terris Manager Gardening Maintenance Jim Gish Manager Landscape Specialty Tegwyn Maintenance and project Delivery Scott Sherwood Director Transportation Services Glenl Wear Director Grounds Supervisor Specialty Crews 17 Area supervisors Custodial Maintenance Charles Anderson Supervisor Activity

Seamons, Kent E.

406

Environmental Management System Plan  

E-Print Network (OSTI)

management Water conservation LBNLs approach to sustainable environmentalWater Discharges) of Introduction Environmental Managementenvironmental compliance programs, such as air and water quality, as well as less traditional programs, such as wildland fire management,

Fox, Robert

2009-01-01T23:59:59.000Z

407

Management of Nuclear Materials  

Directives, Delegations, and Requirements

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 410.2. Admin Chg 1 dated 4-10-2014, cancels DOE O 410.2.

2009-08-17T23:59:59.000Z

408

Improving Project Management  

Energy.gov (U.S. Department of Energy (DOE))

On December 19, 2014, the Energy Department released its "Improving Project Management" report, a roadmap to transformation in funding, culture, project ownership, independent oversight and front-end planning from experienced project management leaders.

409

DECENTRALIZED WASTEWATER MANAGEMENT  

E-Print Network (OSTI)

1 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES Katie Sheehan wastewater treatment technologies. www.njunsystems.com Version 1.0, April 2013 #12; 2 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES PART ONE: BACKGROUND, ISSUES, AND PROGRAM

Rosemond, Amy Daum

410

Information Technology Project Management  

Directives, Delegations, and Requirements

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

2012-12-03T23:59:59.000Z

411

Information Technology Project Management  

Directives, Delegations, and Requirements

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

2012-12-03T23:59:59.000Z

412

COMPREHENSIVE LEGACY MANAGEMENT  

Office of Legacy Management (LM)

Comprehensive Legacy Management and Institutional Controls Plan U.S. Department of Energy Volume I-Legacy Management Plan Doc. No. S03496-8.0-Final Page 6 January 2015...

413

Risk Management Guide  

Directives, Delegations, and Requirements

This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Cancels DOE G 413.3-7.

2011-01-18T23:59:59.000Z

414

Best Environmental Management Practices  

E-Print Network (OSTI)

Best Environmental Management Practices Farm Animal Production Disposal of Farm Medical Wastes Dan Vitamins and minerals Topical Medications Sprays Dewormers Ointments #12;Best Environmental Management of environmental contamination with chemicals or infectious agents. These include, among others: Injectable

415

Program Management | Department of Energy  

Energy Savers (EERE)

Management Program Management The Oak Ridge Office of Environmental Management is located in the Joe L. Evins Federal Building in Oak Ridge, Tennessee. The Oak Ridge Office of...

416

Conservation and drought management  

E-Print Network (OSTI)

Fall 2012 tx H2O 5 Column by Dr. Calvin Finch, Water Conservation and Technology Center director Conservation and Drought Management WAT E R CONSERVATION & TECHNOLOGY CENTER Securing Our Water Future Water conservation and drought... management are related, but they are not the same. Water conservation is a long-term e#27;ort to reduce the amount of water it takes to manufacture goods, manage households and care for landscapes. Drought management is water-use rules initiated to deal...

Finch, Calvin

2012-01-01T23:59:59.000Z

417

Portfolio Manager Overview Presentation  

Energy.gov (U.S. Department of Energy (DOE))

This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on the Portfolio Manager Overview

418

Benchmarking Corporate Energy Management  

E-Print Network (OSTI)

BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...

Norland, D. L.

419

Maintenance and Veg Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure projects Interconnection OASIS OATT Reauthorization of Transmission Line Permits, Maintenance and Vegetation Management on Forest Service Lands in Colorado,...

420

Ultraviolet Radiation and Incidence of Non-Hodgkins Lymphoma among Hispanics in the United States  

Science Journals Connector (OSTI)

...Conn. Med., 60: 579-582, 1996. 2 Cartwright R., McNally R., Staines A. The increasing incidence of non-Hodgkins...Hartge P., Devesa S. S., Grauman D., Fears T. R., Fraumeni J. F., Jr. Non-Hodgkins lymphoma and sunlight. J. Natl...

Shasa Hu; Fangchao Ma; Fernando Collado-Mesa; and Robert S. Kirsner

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Shaping of Thin Grazing-Incidence Reflection Grating Substrates via Magnetorheological Finishing  

E-Print Network (OSTI)

for sub-arcsecond reflection optics. Keywords: x-ray optics, Constellation-X, reflection gratings, thin, such as Constellation-X,1 rely on grazing-incidence reflection gratings to provide the necessary high diffraction efficiency and dispersion for soft x-ray photons in the energy range of approximately 0.25 - 2.0 keV (0.6 - 5

422

Emergency Action Plan For incidents involving hazardous materials, fires, explosions, or natural gas  

E-Print Network (OSTI)

-492-6025. For Non-Emergency Fire and Natural Gas Questions call the CU Fire Marshall @ 303-492-4042. AdditionalEmergency Action Plan For incidents involving hazardous materials, fires, explosions, or natural gas leaks, the following actions should be taken: 1) Life Safety First 2) Evacuate Immediate Area 3

Mojzsis, Stephen J.

423

SPACE WEATHER AND THE INCIDENCE OF REACTIVE "OFF-COST" OPERATIONS IN THE PJM POWER GRID  

E-Print Network (OSTI)

SPACE WEATHER AND THE INCIDENCE OF REACTIVE "OFF-COST" OPERATIONS IN THE PJM POWER GRID 7.6 Kevin F the price of electricity in the PJM power grid. In this paper we examine one of the mechanisms by which space weather impacts the electricity market in the PJM power grid. The starting point of this paper

Schrijver, Karel

424

Carotid intima-media thickness is associated with incidence of hospitalized atrial fibrillation  

Science Journals Connector (OSTI)

AbstractObjective Carotid intima-media thickness (IMT) is a measure of arterial thickening and a risk predictor for myocardial infarction and stroke. It is unclear whether IMT also predicts atrial fibrillation (AF). We explored the association between IMT and incidence of first AF hospitalization in a population-based cohort. Methods IMT was measured in 4846 subjects from the general population (aged 4668 years, 60% women) without a history of AF, heart failure or myocardial infarction. The Swedish in-patient register was used for retrieval of AF cases. IMT was studied in relation to incidence of AF. Results During a mean follow-up of 15.3 years, 353 subjects (181 men, 172 women, 4.8 per 1000 person-years) were hospitalized with a diagnosis of AF. After adjustment for cardiovascular risk factors, the hazard ratio (HR) for incidence of AF was 1.61 (95% confidence interval (CI): 1.142.27) for 4th vs. 1st quartile of IMT in the common carotid artery. This relationship was also independent of occurrence of carotid plaque. The results were similar for IMT in the bifurcation. Conclusion Carotid IMT was independently associated with incidence of hospitalized AF in this study of middle-aged subjects from the general population. The results suggest that arterial thickening can predict future AF.

Samuel Adamsson Eryd; Gerd stling; Maria Rosvall; Margaretha Persson; J. Gustav Smith; Olle Melander; Bo Hedblad; Gunnar Engstrm

2014-01-01T23:59:59.000Z

425

Using IEC 61508 to Guide the Investigation of Computer-Related Incidents and Accidents  

E-Print Network (OSTI)

applications. This has had `knock-on' effects in terms of the complexity of any incident investigation by fractional distillation into intermediate products, including light and heavy diesel, naptha, kerosese a fire in part of the crude distillation unit within the plant. This led to a number of knock-on effects

Johnson, Chris

426

Incidence of ischemic stroke according to income level among older people: the 3C study  

E-Print Network (OSTI)

1 Incidence of ischemic stroke according to income level among older people: the 3C study Olivier 26 25. Email: olivier.grimaud@ehesp.fr Abstract Background Stroke has been shown to follow a social between socioeconomic status and ischemic stroke risk amongst older people. Setting The Cities of Bordeaux

Paris-Sud XI, Université de

427

One-dimensional Grazing Incidence Zone Plate For Focusing Soft X-rays  

SciTech Connect

We have designed and manufactured a grazing incidence FZP having a non-symmetrical one-dimensional zone structure in order to minimize an outermost zone width. The focal spot size obtained by the FZP is determined by the outermost zone width, and which depends on the manufacturing technique. The projected zone width can be decreased as sine function of the incidence angle. Overall dimension of the zone plate is calculated on the basis that the optical pass difference must be the multiple of a half the wavelength. Two dimensional focusing can be conducted by using a pair of them for vertical and horizontal focusing, correspondingly. Another advantage of the device is that the same focal length can be obtained in case of changing the wavelength. In the case of conventional FZP, experiments using variable wavelength, such as micro-EXAFS, are very difficult because the focal length shifts inversely proportional to the wavelength. The focal length shift can be corrected by changing the incidence angle in the case of the grazing incidence FZP. Electron beam lithography and reactive ion etching technique are used to manufacture FZP. Vanadium is chosen as FZP material since it has high etching rate with CF4 gas.

Koike, Masaki; Ikeura-Sekiguchi, Hiromi; Suzuki, Isao H. [Photonics Research Institute, National Institute of Advanced Industrial Science and Technology, Umezono, Tsukuba-shi, Ibaraki, 305-8568 (Japan)

2004-05-12T23:59:59.000Z

428

Modeling Disease Incidence Data with Spatial and Spatio-Temporal Dirichlet Process Mixtures  

E-Print Network (OSTI)

Modeling Disease Incidence Data with Spatial and Spatio-Temporal Dirichlet Process Mixtures approaches to analyze such data. We develop a hierarchical specification using spatial random effects modeled. Key words: Areal unit spatial data; Dirichlet process mixture models; Disease mapping; Dy- namic

Wolpert, Robert L

429

A two-stage model for incidence and prevalence in point-level spatial count data  

E-Print Network (OSTI)

A two-stage model for incidence and prevalence in point-level spatial count data Virginia Recta about the underlying data generating process. We utilize a two-stage spatial generalized linear mixed and real data from an ecological field survey. 1 Introduction Spatial count data arise frequently

Haran, Murali

430

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous or emergency  

E-Print Network (OSTI)

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous and staff, employees, students and visitors. Violent behavior, threats of violence, or physical intimidation of threatening or violent conduct in the workplace, or who observes such behavior or believes a credible threat

Goldberg, Bennett

431

Global dynamics of a vector disease model with saturation incidence and time delay  

Science Journals Connector (OSTI)

......Journal of Applied Mathematics (2011) 76, 919-937 doi:10.1093/imamat/hxr013 Advance Access publication on March 17, 2011 Global dynamics of a vector disease model with saturation incidence and time delay RUI XU Institute of Applied Mathematics......

Rui Xu; Zhien Ma

2011-12-01T23:59:59.000Z

432

Alpha-particle breakup at incident energies of 20 and 40 MeV/nucleon  

Science Journals Connector (OSTI)

The breakup of alpha particles at incident energies of 20 and 40 MeV/nucleon on Al27, Ni58, Zr90, and Bi209 has been studied. It was found that the breakup cross section decreases rapidly with increasing angles and increases with increasing target mass and incident energy. The total breakup yield, summed over all charged fragments, is ?15-35% of the alpha-particle total reaction cross section, and has an approximate A13 dependence. The ratios of breakup yields among different fragments are approximately p:d:t:He3?13:3:1:2, and are roughly independent of the incident energy and the target nucleus. These features suggest that the alpha-particle fragmentation is a peripheral process and is dominated by the properties of the incident projectile. A simple plane-wave alpha-particle breakup model gives a rather good description to the experimental data. In addition to the breakup deuteron peak at half of the beam energy, a second peak at quarter of the beam energy (or the same energy as the breakup proton peak) is observed. This peak might be due to a two-step breakup-pickup process.NUCLEAR REACTIONS Al27, Ni58, Zr90, Bi209(?,xp), (?,xd), (?,xt), (?, xHe3,) E?=80,160 MeV; ?=6-30, measured d2?d?dE, deduced alpha-particle breakup yield, Comparisons with alpha-particle breakup model.

J. R. Wu; C. C. Chang; H. D. Holmgren; R. W. Koontz

1979-10-01T23:59:59.000Z

433

Photodynamic Effect of Hematoporphyrin Derivative as a Function of Optical Spectrum and Incident Energy Density  

Science Journals Connector (OSTI)

...visible light, i.e., low energy photons, the photodynamic effect...quanta rather than on incident energy. The work reported here represents...content and total delivered light energy on cell survival. MATERIALS...cially available 1000 watt Xenon solar simulator (Oriel Corporation...

J. H. Kinsey; D. A. Cortese; H. L. Moses; R. J. Ryan; and E. L. Branum

1981-12-01T23:59:59.000Z

434

Prospective Study of UV Exposure and Cancer Incidence Among Swedish Women  

Science Journals Connector (OSTI)

...detailed individual data on solar and artificial UV exposure in...843 subjects with a total energy intake outside the 1st and 99th...cancer incidence for either solar UV exposure (as indicated by...our study as a crude proxy of solar UV exposure. Sunburns are a...

Ling Yang; Marit B. Veierd; Marie Lf; Sven Sandin; Hans-Olov Adami; and Elisabete Weiderpass

2011-07-01T23:59:59.000Z

435

The low energy ion assisted control of interfacial structure: Ion incident energy effects  

E-Print Network (OSTI)

The low energy ion assisted control of interfacial structure: Ion incident energy effects X. W Science and Engineering, School of Engineering and Applied Science, University of Virginia of interlayer mixing are primarily controlled by the adatom energy used in the deposition. Inert gas ion

Wadley, Haydn

436

The Smith Normal Form of the Incidence Matrix of Skew Lines in PG(3, q)  

E-Print Network (OSTI)

The Smith Normal Form of the Incidence Matrix of Skew Lines in PG(3, q) Peter Sin, University. In our case D = q4I. #12;Smith normal forms A, L define endomorphisms of the free Z-module on lines. Cokernel of A is called the Smith group and the torsion subgroup of the cokernel of L is known

Sin, Peter

437

Resonant normal-incidence separate-absorption-charge-multiplication Ge/Si avalanche  

E-Print Network (OSTI)

-speed InP /InGaAsP /InGaAs avalanche photodiodes grown by chemical beam epitaxy," IEEE J. Quantum ElectronResonant normal-incidence separate-absorption- charge-multiplication Ge/Si avalanche photodiodes the impedance of separate-absorption-charge- multiplication Ge/Si avalanche photodiodes (APD) is characterized

Bowers, John

438

Ambient air pollution exposure and the incidence of related health effects among racial/ethnic minorities  

SciTech Connect

Differences among racial and ethnic groups in morbidity and mortality rates for diseases, including diseases with environmental causes, have been extensively documented. However, documenting the linkages between environmental contaminants, individual exposures, and disease incidence has been hindered by difficulties in measuring exposure for the population in general and for minority populations in particular. After briefly discussing research findings on associations of common air pollutants with disease incidence, the authors summarize recent studies of radial/ethnic subgroup differences in incidence of these diseases in the US. They then present evidence of both historic and current patterns of disproportionate minority group exposure to air pollution as measured by residence in areas where ambient air quality standards are violated. The current indications of disproportionate potential exposures of minority and low-income populations to air pollutants represent the continuation of a historical trend. The evidence of linkage between disproportionate exposure to air pollution of racial/ethnic minorities and low-income groups and their higher rates of some air pollution-related diseases is largely circumstantial. Differences in disease incidence and mortality rates among racial/ethnic groups are discussed for respiratory diseases, cancers, and lead poisoning. Pollutants of concern include CO, Pb, SO{sub 2}, O{sub 3}, and particulates.

Nieves, L.A.; Wernette, D.R.

1997-02-01T23:59:59.000Z

439

incident_investigation_form.docx Revision Date: 2/5/2013 Page 1 of 2  

E-Print Network (OSTI)

layout is hazardous Unsafe lighting Unsafe ventilation Lack of personal protective equipment (PPE of Report: Reported by: Supervisor EH&S Team Other__________ DESCRIBE THE INCIDENT Exact Location) Inadequate guard Unguarded hazard Safety device is defective Tool or equipment defective Workstation

440

Management Transition Guidance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Records and Information Records and Information Management Transition Guidance November 2013 Records and Information Management Transition Guidance i Records and Information Management Transition Guidance Table of Contents Executive Summary ........................................................................................................................ 1 1.0 Introduction and Purpose ..................................................................................................... 1 LM Records Functions ................................................................................................................ 1 2.0 The Records Life Cycle ....................................................................................................... 2 3.0 Organizational Responsibilities ........................................................................................... 2

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Sport Management Academic Offerings  

E-Print Network (OSTI)

production and programming of events; marketing and public relations; technological operations management Exploration of a topic (to be determined) not covered by the standard curriculum but of interest to faculty and sponsoring events. Management process, including theory of management and practical applications within

Raina, Ramesh

442

Best Environmental Management Practices  

E-Print Network (OSTI)

Best Environmental Management Practices Farm Animal Production Land Application of Manure management practices to avoid polluting surface or groundwater. 1. Public and private water wells Public pollution of surface waters increases. Therefore, to avoid this risk, manure P loadings should be managed

443

Financial Management Oversight  

Directives, Delegations, and Requirements

The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Cancels DOE O 2200.13.

2006-08-31T23:59:59.000Z

444

Blowout control: Response, intervention and management. Part 12  

SciTech Connect

This concluding article of the 12-part series discusses reasons why operators need to establish some type of Well Control Incident Management System (WCIMS). A proposed system is presented, including five major subsystems. For operators who find these intimidating, a minimum program is suggested. The section on blowout control alliances discusses the evolution of oilwell firefighting and how it has become extremely competitive while the number of incidents is less than it used to be. It is suggested that this situation is diluting the experience level within the oilwell firefighting industry and is, thus, generating a need for alliances between operators, contractors and subcontractors--even between operators--where one company`s problem could involve other operators.

Wright, J.W.; Flak, L.H. [Wright Boots and Coots, Houston, TX (United States)

1995-04-01T23:59:59.000Z

445

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM  

E-Print Network (OSTI)

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM Adarshpal S with a description of the SHAMAN system and briefly introduces its applica- tions to the management of tactical for MANagement). This management system developed at the Network Management Laboratory of the Univer- sity

Sethi, Adarshpal

446

Configuration management in nuclear power plants  

E-Print Network (OSTI)

Configuration management (CM) is the process of identifying and documenting the characteristics of a facility's structures, systems and components of a facility, and of ensuring that changes to these characteristics are properly developed, assessed, approved, issued, implemented, verified, recorded and incorporated into the facility documentation. The need for a CM system is a result of the long term operation of any nuclear power plant. The main challenges are caused particularly by ageing plant technology, plant modifications, the application of new safety and operational requirements, and in general by human factors arising from migration of plant personnel and possible human failures. The IAEA Incident Reporting System (IRS) shows that on average 25% of recorded events could be caused by configuration errors or deficiencies. CM processes correctly applied ensure that the construction, operation, maintenance and testing of a physical facility are in accordance with design requirements as expressed in the d...

2003-01-01T23:59:59.000Z

447

Integrated Safety Management (ISM)  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Safety Management Integrated Safety Management Home ISM Policy ISM Champions ISM Workshops Resources Archives Contact Us Health and Safety HSS Logo Integrated Safety Management (ISM) ism logo Welcome to the Department of Energy's Office of Health, Safety and Security (HSS) Integrated Safety Management (ISM) Web Site. The Department and its contractors remain firmly committed to ISM as first defined in 1996. The objective of ISM is to perform work in a safe and environmentally sound manner. More specifically, as described in DOE P 450.4, Safety Management System Policy: "The Department and Contractors must systematically integrate safety into management and work practices at all levels so that missions are accomplished while protecting the public, the worker, and the environment. This is to be accomplished through effective integration of safety management into all facets of work planning and execution." "

448

ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ENVIRONMENTAL ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF EM Recovery NEWS FLASH RECOVERY.GOV March 10, 2011 American Recovery and Reinvestment Act Payments Surge Past $4 Billion U.S. Depar tment of Energy | Office of Environmental Management For More Information on EM Recovery Act Work, Visit Us on the Web: http://www.em.doe.gov/emrecovery/ FINANCIAL HIGHLIGHTS * More than $4 BILLION in Recovery Act payments are accelerating environmental cleanup * 67% of EM Recovery Act funds have been paid Financial data are based on reporting as of March 9, 2011, and are subject to change. EM has made more than $4 billion in Recovery Act payments, or 32 percent of the DOE's $12.4 billion in Recovery Act payments. DOE received $35.2 billion

449

Energy Management Working Group: Accelerating Energy Management  

E-Print Network (OSTI)

Countries participating in the Global Superior Energy Performance (GSEP) Energy Management Working Group (EMWG) are leveraging their resources and taking collective action to strengthen national and international efforts to facilitate the adoption...

Scheihing, P.

2014-01-01T23:59:59.000Z

450

Strategies for Successful Energy Management  

Energy.gov (U.S. Department of Energy (DOE))

This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

451

Changes in Nonmelanoma Skin Cancer Incidence between 19771978 and 19981999 in Northcentral New Mexico  

Science Journals Connector (OSTI)

...follow-up survey of NMSC in New Mexico and report here incidence rate...three-county area in northcentral New Mexico for two 12-month time periods...the highest levels of ambient solar UV radiation. Subsequent surveys...the resident population of New Mexico. Incidence rates in New Mexico...

William F. Athas; William C. Hunt; and Charles R. Key

2003-10-01T23:59:59.000Z

452

Pump pulse-width dependence of grazing-incidence pumped transient collisional soft-x-ray lasers M. Berrill,1  

E-Print Network (OSTI)

Pump pulse-width dependence of grazing-incidence pumped transient collisional soft-x-ray lasers M 2007 The output energy dependence of high repetition rate grazing incidence pumped Ni-like Mo, Ni-like Ag, and Ne-like Ti transient collisional soft x-ray lasers on the duration of the pump pulse

Rocca, Jorge J.

453

Federal Energy Management Program: Federal Energy and Water Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Energy and Federal Energy and Water Management Awards to someone by E-mail Share Federal Energy Management Program: Federal Energy and Water Management Awards on Facebook Tweet about Federal Energy Management Program: Federal Energy and Water Management Awards on Twitter Bookmark Federal Energy Management Program: Federal Energy and Water Management Awards on Google Bookmark Federal Energy Management Program: Federal Energy and Water Management Awards on Delicious Rank Federal Energy Management Program: Federal Energy and Water Management Awards on Digg Find More places to share Federal Energy Management Program: Federal Energy and Water Management Awards on AddThis.com... Project Assistance Training Outreach Awards for Saving Energy Federal Energy and Water Management Better Buildings Federal Award

454

Federal Energy Management Program: Interagency Energy Management Task Force  

NLE Websites -- All DOE Office Websites (Extended Search)

About the Program About the Program Site Map Printable Version Share this resource Send a link to Federal Energy Management Program: Interagency Energy Management Task Force Members to someone by E-mail Share Federal Energy Management Program: Interagency Energy Management Task Force Members on Facebook Tweet about Federal Energy Management Program: Interagency Energy Management Task Force Members on Twitter Bookmark Federal Energy Management Program: Interagency Energy Management Task Force Members on Google Bookmark Federal Energy Management Program: Interagency Energy Management Task Force Members on Delicious Rank Federal Energy Management Program: Interagency Energy Management Task Force Members on Digg Find More places to share Federal Energy Management Program: Interagency Energy Management Task Force Members on AddThis.com...

455

Upgrade on risk analysis following the 080919 incident in the LHC sector 3-4  

E-Print Network (OSTI)

On 19th September 2008, during powering tests of the main dipole circuit in sector 3-4 of the LHC, an electrical fault occurred producing an electrical arc and resulting in mechanical and electrical damage, release of about 6 tons of helium from the magnet cold mass to the insulation vacuum enclosure and consequently to the tunnel, via the spring-loaded relief discs on the vacuum enclosure. The helium discharge from the cold mass to the vacuum enclosure exceeded by an order of magnitude, the maximum credible incident (MCI) flow described in the preliminary risk analysis performed in 1998. Based on the experience gained from the 19th September 2008 incident, a new MCI has been formulated and the cryogenic risk analysis has been revised and updated. The recommendations concerning the safety relief system protecting the vacuum vessels and the mechanical properties of the doors installed in the tunnel have been formulated.

Chorowski, M; Modlinski, Z; Polinski, J; Tavian, L; Wach, J; CERN. Geneva. ATS Department

2010-01-01T23:59:59.000Z

456

Program Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Management Program Management Safety The Office of Environmental Management's (EM) top priority is to ensure proper implementation and continuous improvement of Integrated Safety Management Systems (ISMS) in the EM complex and to serve as a focal point for EM safety standards and policy development and interpretation and interfaces with internal/external oversight organizations Read more Acquisition The Office of Environmental Management strives to assure effective project, acquisition, and contract management, by working closely with senior level officials in Headquarters and Field Managers; external stakeholders; and major contractors for the purpose of achieving acquisition and project management objectives of the Office of Environmental Management (EM)

457

Business System Management Review  

NLE Websites -- All DOE Office Websites (Extended Search)

P-004 Business System Management Review Process 11_0304Page 1 of 7 P-004 Business System Management Review Process 11_0304Page 1 of 7 EOTA - Business Process Document Title: Business System Management Review Process Document Number: P-004 Rev 11_0304 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): F-009, Business System Management Review Template P-004 Business System Management Review Process 11_0304Page 2 of 7 Revision History: Rev. Description of Change A Initial Release 08_0414 Corrective Actions, Preventive Actions, and Improvement Opportunity 09_1124 Edited document for clarity and to better fit the process in use. Added requirement to provide management with

458

Climate and Landscape Factors Associated with Buruli Ulcer Incidence in Victoria, Australia  

E-Print Network (OSTI)

, 3Department of Mathematical Sciences, University of Wisconsin-Milwaukee, Milwaukee, Wisconsin, United States of America, 4Center for Statistical Training and Consulting, Michigan State University, East Lansing, Michigan, United States of America, 5... transmission investigations. Citation: van Ravensway J, Benbow ME, Tsonis AA, Pierce SJ, Campbell LP, et al. (2012) Climate and Landscape Factors Associated with Buruli Ulcer Incidence in Victoria, Australia. PLoS ONE 7(12): e51074. doi:10.1371/journal...

van Ravensway, Jenni; Benbow, Mark Eric; Tsonis, Anastasios A.; Pierce, Steven J.; Campbell, Lindsay P.; Fyfe, Janet A. M.; Hayman, John A.; Johnson, Paul D. R.; Wallace, John R.; Qi, Jiaguo

2012-12-10T23:59:59.000Z

459

Weekly Security Incident Log Period of Apr 28 -May 4, 2014  

E-Print Network (OSTI)

member who was previously trespassed from campus several years prior. No further action was required. 5/2 transported the individual to hospital for further medical care. 5/2/2014 10:10 AM Emergency Medical 2014 in a washroom. 5/2/2014 03:18 PM Theft, Under Printed: 5/5/2014 4:13:20 PM 1Weekly Security Incident Log Period

460

General formula for the incidence factor of a solar heliostat receiver system  

SciTech Connect

A general formula is derived for the effective incidence factor of an array of heliostat mirrors for solar power collection. The formula can be greatly simplified for arrays of high symmetry and offers quick computation of the performance of the array. It shows clearly how the mirror distribution and locations affect the overall performance and thus provide a useful guidance for the design of a solar heliostat receiver system.

Wei, L.Y.

1980-09-15T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Analysis of the HSEES Chemical Incident Database Using Data and Text Mining Methodologies  

E-Print Network (OSTI)

was established to meet the federal hazardous material transportation regulation. All modes of transportation except for pipeline and bulk marine transportation are covered by the HMIRS database. The process industry should take advantage of these chemical... al., 1999). HSEES HMIRSOSHA RMP Fixed facility Transportation Railroad, Highway, Pipeline, Waterways Residence areas Agricultural areas Public areas Industry 4 Based on the availability of chemical incident database and their evident...

Mahdiyati, -

2012-07-16T23:59:59.000Z

462

Chapter 1 - Risk Management  

Science Journals Connector (OSTI)

This chapter describes the principles of risk management as they apply to the offshore oil and gas industry, the impact the Deepwater Horizon/Macondo event had on the industry and how safety management systems have evolved in response. The fundamentals of safety management are described including: acceptable risk, process safety and culture, the use of risk matrices, the economics of offshore safety, means of measuring progress, and leading and lagging indicators. The distinction between prescriptive and nonprescriptive systems is discussed.

Ian Sutton

2014-01-01T23:59:59.000Z

463

Sustainable Energy Management Programs  

E-Print Network (OSTI)

Sustainable Energy Management Programs Steve Hanner Allen ISD/TEMA . ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Starting an Energy Management Program Recognize need, Elicit District Commitment... Appoint Energy Manager Analyze Existing Conditions Develop Plan Implement and Monitor Program ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Sustainable Programs Feature District Commitment...

Hanner, S.

2014-01-01T23:59:59.000Z

464

Tests of a grazing-incidence ring resonator free-electron laser  

SciTech Connect

This paper reports on the Boeing free-electron laser (FEL) optical cavity that has been changed from a simple concentric cavity using two spherical mirrors to a larger grazing-incidence ring resonator. The new resonator consists of two mirror telescopes located at each end of the wiggler with a round-trip path length of approximately 133 m. Each telescope is a grazing-incidence hyperboloid followed by a normal-incidence paraboloid. Initial tests showed that poorly positioned ring focus and unreliable pointing alignment resulted in reduced and structured FEL output. (First lasing operation occurred on March 23 and 24, 1990.) Later efforts concentrated on improving the resonator alignment techniques and lowering the single-pass losses. FEL performance and reliability have significantly improved due to better ring alignment. The alignment procedure and recent lasing results are described. The effect the electron beam has on lasing is also discussed. Measurements are presented showing how FEL temporal output and wavelength are sensitive to electron beam energy variations.

Dowell, D.H.; Laucks, M.L.; Lowrey, A.R.; Adamski, J.L.; Pistoresi, D.J.; Shoffstall, D.R. (Boeing Aerospace and Electronics, Seattle, WA (US)); Bentz, M.P.; Burns, R.H.; Guha, J.; Sun, K.; Tomita, W. (Rockwell International Corp., Canoga Park, CA (United States). Rocketdyne Div.); Lumpkin, A.H.; Bender, S.; Byrd, D.; Tokar, R.L. (Los Alamos National Lab., NM (United States))

1991-12-01T23:59:59.000Z

465

Nuclear incident monitor criticality alarm instrument for the Savannah River Site: Technical manual  

SciTech Connect

The Savannah River Site is a Department of Energy facility. The facility stores, processes, and works with fissionable material at a number of locations. Technical standards and US Department of Energy orders, require these locations to be monitored by criticality alarm systems under certain circumstances. The Savannah River Site calls such instruments Nuclear Incident Monitors or NIMs. The Sole purpose of the Nuclear Incident Monitor is to provide an immediate evacuation signal in the case of an accidental criticality in order to minimize personnel exposure to radiation. The new unit is the third generation Nuclear Incident Monitor at the Savannah River Site. The second generation unit was developed in 1979. It was designed to eliminate vacuum-tube circuits, and was the first solid state NIM at SRS. The major design objectives of the second generation NIM were to improve reliability and reduce maintenance costs. Ten prototype units have been built and tested. This report describes the design of the new NIM and the testing that took place to verify its acceptability.

Jenkins, J.B.

1996-05-21T23:59:59.000Z

466

EMERGENCY MANAGEMENT (EM)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT (EM) MANAGEMENT (EM) OBJECTIVE EM.1 A routine drill program and emergency operations drill program, including program records, have,been established and implemented. (Core Requirement 11) Criteria 1. Emergency preparedness drills and exercises are conducted and an adequate response capability,exists. 2. Routine operations drills and exercises are conducted and an adequate response capability exists. 3. Applicable emergency management documentation (e.g., Building Emergency Plan, emergency,response procedures, Emergency Preparedness Hazards Assessment, alarm response procedures,,and emergency response procedures) has been updated to reflect implementation of the TA-55 . Approach Record Reviews: Review the emergency management documents (e.g., Building

467

Federal Identity Management Handbook  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Identity Management Handbook Federal Identity Management Handbook Version 0.1 December 2005 VERSION 0.1 Federal Identity Management Handbook Acknowledgements The Office of Management and Budget and the Federal Identity Credentialing Committee would like to acknowledge the significant contributions of the National Institute of Standards and Technology (NIST) and the Government Smart Card Interagency Advisory Board (IAB) for providing valuable contributions to the development of this handbook. A special thanks goes out to those who participated in the various workshops and provided valuable subject matter expertise and lessons learned. The comments received from other government and industry organizations are also acknowledged. VERSION 0.1 i

468

Integrated Safety Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety Management BEHAVIOR (SAFETY CULTURE) - principles of behavior (values) - align motivations PLAN WORK define project scope define facility functional requirements define and...

469

Traffic Management Specialist  

Energy.gov (U.S. Department of Energy (DOE))

The incumbent in this position will serve as a Traffic Management Specialist for BPAs Transmission Business Line (TBL) and oversee commercial transportation services for the movement of materials...

470

Radioactive Waste Management  

Directives, Delegations, and Requirements

To establish policies and guidelines by which the Department of Energy (DOE) manages tis radioactive waste, waste byproducts, and radioactively contaminated surplus facilities.

1984-02-06T23:59:59.000Z

471

Advisory Committee Management Program  

Directives, Delegations, and Requirements

The Manual provides detailed DOE requirements, responsibilities, processes, and procedures for the establishment, operation, and management of advisory committees. Cancels DOE M 510.1-1.

2007-10-22T23:59:59.000Z

472

Change Control Management Guide  

Directives, Delegations, and Requirements

The Guide provides a suggested approach and uniform guidance for managing project and contract changes through applying the requirements of DOE O 413.3B. No cancellation.

2011-07-29T23:59:59.000Z

473

Environmental Resource Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Resource Management This division delivers science-based engineering solutions to meet regional and national energy, water and other critical environmental...

474

Management Control Program  

Directives, Delegations, and Requirements

To establish requirements and responsibilities for the Department of Energy Management Control Program. Cancels DOE O 413.1. Canceled by DOE O 413.1B.

2002-04-18T23:59:59.000Z

475

Contemporary heart failure management.  

E-Print Network (OSTI)

??The research presented within this thesis aims to add to the current knowledge regarding contemporary heart failure (HF) management. Chapter 2 describes a study collating (more)

Wasywich, Cara Anne

2009-01-01T23:59:59.000Z

476

Strategisches Management und Strategiegenese  

Science Journals Connector (OSTI)

Im vorhergenden Kapitel wurden die theoretischen Grundlagen von Total Quality Management erlutert und differenzierte Untersuchungen zu Umsetzungsversuchen im betrachteten Unternehmen angestellt. Ergebnis dies...

Martin Boehme

1998-01-01T23:59:59.000Z

477

Project Risk Management:.  

E-Print Network (OSTI)

?? The recent increase in international projects has resulted in higher risk along with difficulties in control and coordination. Effective project management can therefore be (more)

Koelmeyer, Chris

2013-01-01T23:59:59.000Z

478

Inventory Management Specialist  

Energy.gov (U.S. Department of Energy (DOE))

(See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Upper Great Plains Region, Management (B1000), duty station Fort Peck, Montana...

479

Property Management Specialist  

Energy.gov (U.S. Department of Energy (DOE))

(See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Upper Great Plains Region, Management (B1000), duty station, Bismarck, North...

480

EERE Program Management Guide  

Office of Energy Efficiency and Renewable Energy (EERE)

Updated in December 2007, this guide is a comprehensive reference manual on EERE program management. The following documents are available as Adobe Acrobat PDFs.

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

INL's Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

and minimize environmental impacts throughout the lifecycle of INL facilities and operations. Conduct all activities and manage hazardous and radioactive materials and...

482

Energy Management Systems  

E-Print Network (OSTI)

This presentation will address results from a pilot project with 10 chemical plants on energy management systems and the development of an energy efficiency plant certification program....

Ferland, K.

2007-01-01T23:59:59.000Z

483

Parallel integrated thermal management  

DOE Patents (OSTI)

Embodiments discussed herein are directed to managing the heat content of two vehicle subsystems through a single coolant loop having parallel branches for each subsystem.

Bennion, Kevin; Thornton, Matthew

2014-08-19T23:59:59.000Z

484

Management's Discussion & Analysis Profile  

NLE Websites -- All DOE Office Websites (Extended Search)

7-26-2013. Management's Discussion & Analysis Profile The Bonneville Power Administration is a federal agency under the Department of Energy. BPA markets wholesale electrical power...

485

Energy, Data Management, Reporting  

Office of Environmental Management (EM)

Design the Strategy | Deliver Efficiency | Sustain Results Energy, Data Management, Reporting This presentation does not contain any proprietary, confidential, or otherwise...

486

ORISE: Peer Review Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Man participating in a peer review The Oak Ridge Institute for Science and Education (ORISE) ensures that scientific reviews are conducted in a professional manner and...

487

Records Management Program  

Directives, Delegations, and Requirements

The Order sets forth requirements and responsibilities for implementing and maintaining a cost-effective records management program throughout the Department of Energy.

2006-02-03T23:59:59.000Z

488

Records Management Program  

Directives, Delegations, and Requirements

The Order sets forth requirements and responsibilities for establishing and maintaining a program for the efficient and economical management of records and information assets.

2011-07-26T23:59:59.000Z

489

Comprehensive Emergency Management System  

Directives, Delegations, and Requirements

The Order establishes policy and assigns roles and responsibilities for the Department of Energy (DOE) Emergency Management System. Cancels DOE O 151.1B.

2005-11-02T23:59:59.000Z

490

Hydro Capital Asset Manager  

Energy.gov (U.S. Department of Energy (DOE))

This position is located in Federal Hydro Projects, Generation Asset Management, Power Services. Additional vacancies may be filled through this vacancy announcement or if they become available.

491

Environmental Management Commission (Alabama)  

Energy.gov (U.S. Department of Energy (DOE))

The Alabama Department of Environmental Management is charged with developing the state's environmental policy, hearing administrative appeals of permits, administrative orders and variances issued...

492

Faculty of Management University of Lethbridge | 2007 Faculty of Management  

E-Print Network (OSTI)

is what will be inside. new innovative approach- es to research, teaching and learning. Univ-Manage of Management and School of Health Sciences, is close to completion, and all levels of the University communitymatters MANAGEMENT Faculty of Management · University of Lethbridge | 2007 Faculty of Management

Seldin, Jonathan P.

493

Project Management vs. Systems Engineering Management: A Practitioners' View on  

E-Print Network (OSTI)

Project Management vs. Systems Engineering Management: A Practitioners' View on IntegratingPROJECT MANAGEMENT VS. SYSTEMS ENGINEERING MANAGEMENT Received 3 August 2010; Revised 18 December 2010 (wileyonlinelibrary.com). DOI 10.1002/sys.20187 ABSTRACT While most Systems Engineering Management (SEM) applications

de Weck, Olivier L.

494

Integrated Water Management Options in the Nebraska Ground Water Management &  

E-Print Network (OSTI)

Integrated Water Management Options in the Nebraska Ground Water Management & Protection Act by J of the Nebraska Ground Water Management & Protection Act (GMPA) 2. the special GMPA integrated water management a correlative rights framework, and 5. what additional water management tools are needed to effectively deal

Nebraska-Lincoln, University of

495

Safeguards management inspection procedures  

SciTech Connect

The objective of this inspection module is to independently assess the contributions of licensee management to overall safeguards systems performance. The inspector accomplishes this objective by comparing the licensee's safeguards management to both the 10 CFR, parts 70 and 73, requirements and to generally accepted management practices. The vehicle by which this comparison is to be made consists of assessment questions and key issues which point the inspector to areas of primary concern to the NRC and which raise additional issues for the purpose of exposing management ineffectiveness. Further insight into management effectiveness is obtained through those assessment questions specifically directed toward the licensee's safeguards system performance. If the quality of the safeguards is poor, then the inspector should strongly suspect that management's role is ineffective and should attempt to determine management's influence (or lack thereof) on the underlying safeguards deficiencies. (The converse is not necessarily true, however.) The assessment questions in essence provide an opportunity for the inspector to identify, to single out, and to probe further, questionable management practices. Specific issues, circumstances, and concerns which point to questionable or inappropriate practices should be explicitly identified and referenced against the CFR and the assessment questions. The inspection report should also explain why the inspector feels certain management practices are poor, counter to the CFR, and/or point to ineffecive management. Concurrent with documenting the inspection results, the inspector should provide recommendations for alleviating observed management practices that are detrimental to effective safeguards. The recommendations could include: specific changes in the practices of the licensee, followup procedures on the part of NRC, and proposed license changes.

Barth, M.J.; Dunn, D.R.

1984-08-01T23:59:59.000Z

496

POSITION MANAGEMENT ACTION FORM  

E-Print Network (OSTI)

POSITION MANAGEMENT ACTION FORM Workforce Planning | 408-924-2250 classcomp@sjsu.edu SJSU Human FOR POSITION MANAGEMENT FORM Workforce Planning | 408-924-2250| classcomp@sjsu.edu SJSU Human Resources Revised contact your Workforce Planning Analyst. List the name of the position this position reports to

Eirinaki, Magdalini

497

Comprehensive Irrigation Management  

E-Print Network (OSTI)

The other irrigation ? Optimizing water consumption in urban landscapes Kenneth Cook President, Intelligent Irrigation Banyan Water Water risk ? increasing rapidly in the US 2 Sustainable property management 3 ? ?Green? ? Audubon Cert... ? Commoditized relationships ? Disconnect with conservation investments & sustainable water savings ? High turnover rates among property managers and landscape contractors ? Economic pressures on operating expense to maintain system integrity Result...

Cook, K.

2011-01-01T23:59:59.000Z

498

Facilities Management CAD Standards  

E-Print Network (OSTI)

Facilities Management CAD Standards 2011 #12;Facilities Management CAD Standards Providing: Layering Standards 2.1 Layer Name Format 2.2 Layer Name Modifiers 2.3 Layer Attributes 2.4 Special Layer of PDF and DWG Files APPENDIX A: DAL FM CAD Standard Layers APPENDIX B: DAL FM CAD Special Layers

Brownstone, Rob

499

Energy Management Webinar Series  

Energy.gov (U.S. Department of Energy (DOE))

Boost your knowledge on how to implement an energy management system through this four-part webinar series from the Superior Energy Performance program. Each webinar introduces various elements of the ISO 50001 energy management standardbased on the Plan-Do-Check-Act approachand the associated steps of DOE's eGuide for ISO 50001 software tool.

500

Assistant Provost Enrollment Management  

E-Print Network (OSTI)

Management Information Technology ·Admissions ·Financial Aid & Scholarships ·Office of the Registrar emails. OSU Opportunity Scholarships 2/29/08 deadline. #12;Enrollment Management Information Technology #12;Federal & State Issues · Reauthorization of the Higher Education Act ­ impacts many areas

Escher, Christine