Powered by Deep Web Technologies
Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

JC3 Incident Reporting | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Management » JC3 Incident Reporting Management » JC3 Incident Reporting JC3 Incident Reporting JC3 Incident Reporting Procedures U.S. Department of Energy Facilities/Contractors Only DOE O 205.1-B Chg 2 4.(c)(13) DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM requires a defined "process for incident reporting that requires all cyber security incidents involving information or information systems, including privacy breaches, under DOE or DOE contractor control must be identified, mitigated, categorized, and reported to the Joint Cybersecurity Coordination Center (JC3) in accordance with JC3 procedures and guidance." This document outlines the referenced JC3 reporting procedures and guidance to facilitate your reporting and CIRC's response activity. CIRC should be informed of all reportable cyber security incidents as specified below.

2

JC3 Incident Reporting | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy FacilitiesContractors Only DOE O 205.1-B Chg 2 4.(c)(13) DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM requires a defined "process for incident reporting that requires all...

3

JC3 Tools | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

JC3 Tools JC3 Tools JC3 Tools NMAP Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. WireShark Wireshark is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. Microsoft Network Monitor Network Monitor 3.4 is a protocol analyzer. It allows you to capture network traffic, view and analyze it.Solar Winds IP Address Tracker ISC SANS The ISC was created in 2001 following the successful detection, analysis, and widespread warning of the Li0n worm. Today, the ISC provides a free

4

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

5

JC3 Bulletin Archive | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Bulletin Archive Bulletin Archive JC3 Bulletin Archive RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 6, 2013 V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability A vulnerability has been reported in the CentralAuth extension for MediaWik that allows people to bypass certain security restrictions September 5, 2013 V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously A vulnerability was reported in Cisco Mobility Services Engine where a remote user can login anonymously. September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

6

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS November 7, 2012 V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

7

JC3 High Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 5, 2013 V-211: IBM iNotes Multiple Vulnerabilities IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability August 2, 2013 V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated,

8

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2011 T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data Sun Java System Access Manager Lets...

9

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

10

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7, 2011 7, 2011 U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. October 6, 2011 U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers A remote user can access internal servers. October 5, 2011 U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. October 4, 2011 U-003:RPM Package Manager security update RPM Package Manager Header Validation Flaws Let Remote Users Execute

11

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18, 2013 18, 2013 V-137: Apple Mac OS X update for Java Apple has issued an update for Java for Mac OS X April 17, 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 Several vulnerabilities addressed in this Critical Patch Update affect multiple products April 16, 2013 V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. April 15, 2013 V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. April 14, 2013 V-133: Microsoft pulls Patch Tuesday security fix Microsoft has recommended that an update released in the latest Patch Tuesday be removed, after users reported incidents of the "blue screen of

12

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13, 2013 13, 2013 V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 11, 2013 V-175: Microsoft Security Bulletin Advance Notification for June 2013 Microsoft Security Bulletin Advance Notification for June 2013. Microsoft has posted 1 Critical Bulletin and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" June allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on June 12, 2013, at 11:00 AM

13

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2013 5, 2013 V-127: Samba Bug Lets Remote Authenticated Users Modify Files A remote authenticated user can modify files on the target share April 4, 2013 V-126: Mozilla Firefox Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system April 3, 2013 V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. April 2, 2013 V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Splunk Web. April 1, 2013

14

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2012 5, 2012 U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system March 2, 2012 U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address. March 1, 2012 U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability A vulnerability in WorkStation files (.ws) by IBM Personal Communications

15

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities Two vulnerabilities were reported in Apache Tomcat November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands A vulnerability was reported in Cisco Prime Data Center Network Manager. October 31, 2012

16

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2012 19, 2012 V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability November 16, 2012 V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions Two vulnerabilities were reported in RSA Data Protection Manager. November 15, 2012 V-025: Bugzilla Multiple Cross Site Scripting and Information Disclosure Vulnerabilities Bugzilla Multiple Vulnerabilities November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice November 13, 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 Microsoft Security Bulletin Advance Notification for November 2012. Microsoft has posted 4 Critical Bulletins and 1 Important Bulletins.

17

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2013 11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets July 10, 2013 V-196: Microsoft Security Bulletin Advance Notification for July 2013 Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada). July 9, 2013 V-195: RSA Authentication Manager Lets Local Users View the Administrative

18

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24, 2012 24, 2012 U-176: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. May 23, 2012 U-175: Linux Kernel KVM Memory Slot Management Flaw A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system. May 22, 2012 U-174: Serendipity Unspecified SQL Injection Vulnerability A vulnerability was reported in Serendipity. A remote user can inject SQL commands. May 21, 2012 U-173: Symantec Web Gateway Multiple Vulnerabilities Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote

19

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583) May 18, 2011 T-625: Opera Frameset Handling Memory Corruption Vulnerability The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

20

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. September 26, 2011 T-726:Linux-2.6 privilege escalation/denial of service/information leak Vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. September 23, 2011 T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. September 22, 2011 T-724: Microsoft Security Advisory: Fraudulent digital certificates could

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. February 14, 2011 T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote

22

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. November 2, 2011 U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. November 1, 2011 U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data A remote user can obtain configuration information. October 31, 2011 U-023: Debian update for phpldapadmin All versions of phpldapadmin - all released versions as of today are vulnerable to a remote code execution bug. October 28, 2011 U-022: Apple QuickTime Multiple Vulnerabilities

23

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2012 19, 2012 U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in HP StorageWorks File Migration Agent. July 18, 2012 U-215: Oracle Critical Patch Update Advisory - July 2012 Critical Patch Updates are the primary means of releasing security fixes for Oracle products to customers with valid support contracts. They are released on the Tuesday closest to the 17th day of January, April, July and October. July 17, 2012 U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). July 16, 2012 U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

24

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

17, 2012 17, 2012 U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. February 16, 2012 U-105:Oracle Java SE Critical Patch Update Advisory Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. February 16, 2012 U-104: Adobe Flash Player Multiple Vulnerabilities Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. February 15, 2012

25

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-616: PHP Stream Component Remote Denial of Service Vulnerability PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable. May 4, 2011 T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect. May 3, 2011 T-614: Cisco Unified Communications Manager Database Security Vulnerability The vulnerability is due to unspecified errors in the affected software that may allow the attacker to perform SQL injections. An authenticated,

26

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2012 8, 2012 U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. October 5, 2012 U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information. October 4, 2012 U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. October 3, 2012 U-273: Multiple vulnerabilities have been reported in Wireshark

27

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23, 2012 23, 2012 U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. January 20, 2012 U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. January 19, 2012 U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges The system does not properly validate unreferenced URLs. January 18, 2012 U-083:Oracle Critical Patch Update Advisory - January 2012 Critical Patch Update contains 78 new security fixes across all listed product families. January 17, 2012 U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

28

JC3 Medium Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS September 9, 2013 V-237: TYPO3 Security Bypass Vulnerabilities TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations September 4, 2013 V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks September 3, 2013 V-233: Red Hat update for JBoss Fuse This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS. August 28, 2013 V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

29

JC3 Low Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Low Impact Low Impact Assessment Bulletins JC3 Low Impact Assessment Bulletins RSS July 31, 2013 V-207: Wireshark Multiple Denial of Service Vulnerabilities Successful exploitation of this vulnerability may allow execution of arbitrary code. July 30, 2013 V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities Two vulnerabilities have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the vulnerabilities are caused due to a bundled vulnerable version of Java. November 30, 2011 U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code A remote user can upgrade the printer's firmware with arbitrary code

30

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS June 28, 2013 V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability The vulnerability addresses the possibility of a heap overflow condition June 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 19, 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 Multiple vulnerabilities were reported in Oracle Java. June 14, 2013 V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and

31

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security of IBM Tivoli Application Dependency Discovery Manager March 28, 2013 V-121: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google...

32

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 5, 2012 July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). June 29, 2012 U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. June 28, 2012 U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

33

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2013 3, 2013 V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. April 2, 2013 V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Splunk Web. March 27, 2013 V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. March 26, 2013 V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities IBM has acknowledged multiple vulnerabilities March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

34

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 18, 2011 T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device. February 17, 2011 T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via

35

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2011 4, 2011 U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. September 30, 2011 T-731:Symantec IM Manager Code Injection Vulnerability Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. September 29, 2011 T-730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution Citrix Provisioning Services is prone to a remote code-execution vulnerability. Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application. September 29, 2011 T-729: Mozilla Code Installation Through Holding Down Enter

36

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2012 20, 2012 U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses A remote user can spoof SMS source addresses. August 17, 2012 U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. August 16, 2012 U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. August 15, 2012 U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code Execution of arbitrary code via network A remote user can cause arbitrary

37

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 24, 2011 February 24, 2011 T-564: Vulnerabilities in Citrix Licensing administration components The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console. February 23, 2011 T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. February 22, 2011 T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow A vulnerability has been reported in Novell ZENworks Configuration

38

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

39

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 30, 2011 March 30, 2011 T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. March 18, 2011 T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space. March 17, 2011 T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability Novell Access Manager Java Double Literal Denial of Service Vulnerability. March 16, 2011 T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections

40

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 17, 2011 June 17, 2011 T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. June 16, 2011 T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. June 1, 2011 T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could infect their systems after visiting a malicious

42

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 24, 2013 January 24, 2013 V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions. January 23, 2013 V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in EMC AlphaStor. January 22, 2013 V-074: IBM Informix Genero libpng Integer Overflow Vulnerability A vulnerability has been reported in libpng. January 21, 2013 V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw

43

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

44

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 26, 2011 April 26, 2011 T-610: Red Hat kdenetwork security update A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. April 25, 2011 T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user. April 22, 2011 T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to

45

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 23, 2012 May 23, 2012 U-175: Linux Kernel KVM Memory Slot Management Flaw A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system. May 22, 2012 U-174: Serendipity Unspecified SQL Injection Vulnerability A vulnerability was reported in Serendipity. A remote user can inject SQL commands. May 21, 2012 U-173: Symantec Web Gateway Multiple Vulnerabilities Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. May 15, 2012 U-169: Sympa Multiple Security Bypass Vulnerabilities

46

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 22, 2013 May 22, 2013 V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. May 17, 2013 V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. May 16, 2013 V-157: Adobe Reader / Acrobat Multiple Vulnerabilities These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system May 14, 2013 V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session

47

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 20, 2013 May 20, 2013 V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users A vulnerability was reported in RSA SecurID Products. May 15, 2013 V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges A vulnerability was reported in the Linux Kernel. May 10, 2013 V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. May 9, 2013 V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could

48

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 9, 2012 April 9, 2012 U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. April 6, 2012 U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks A remote user can obtain potentially sensitive information. April 2, 2012 U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. March 30, 2012 U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes

49

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 23, 2011 November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 17, 2011 U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges A local user can obtain elevated privileges on the target system.. November 16, 2011 U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code A remote server can cause the target connected client to crash. November 9, 2011 U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated

50

An Incident Management Preparedness and Coordination Toolkit  

Science Conference Proceedings (OSTI)

Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

Koch, Daniel B [ORNL; Payne, Patricia W [ORNL

2012-01-01T23:59:59.000Z

51

Efficiency of critical incident management systems: Instrument development and validation  

Science Conference Proceedings (OSTI)

There is much literature in the area of emergency response management systems. Even so, there is in general a lacuna of literature that deals with the issue of measuring the effectiveness of such systems. The aim of this study is to develop and validate ... Keywords: Critical incident management system (CIMS), Decision support, Emergency response systems, Instrument, Measurement, Media richness theory, National incident management systems (NIMS), Validation

Jin Ki Kim; Raj Sharman; H. Raghav Rao; Shambhu Upadhyaya

2007-11-01T23:59:59.000Z

52

Public health: emergency management: capability analysis of critical incident response  

Science Conference Proceedings (OSTI)

Since the 9/11 terrorist incident, homeland security efforts and the readiness of local emergency management agencies have become focal points in the war on terrorism. A significant issue faced by front line responders has been the significant increase ...

Thomas F. Brady

2003-12-01T23:59:59.000Z

53

ORISE: REAC/TS Medical Management of Radiation Incidents  

NLE Websites -- All DOE Office Websites (Extended Search)

Medical Management of Radiation Incidents As part of its primary mission for the U.S. Department of Energy (DOE), the Radiation Emergency Assistance CenterTraining Site (REACTS)...

54

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

55

Managing Incidents in Smart Grids la Cloud  

Science Conference Proceedings (OSTI)

Over the last decade, the Cloud Computing paradigm has emerged as a panacea for many problems in traditional IT infrastructures. Much has been said about the potential of Cloud Computing in the context of the Smart Grid, but unfortunately it is still ... Keywords: Smart Grid, SCADA systems, Incident Management, Cloud Computing, Cryptography, Searchable Encryption

Cristina Alcaraz; Isaac Agudo; David Nunez; Javier Lopez

2011-11-01T23:59:59.000Z

56

JC3 Bulletin Archive  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bulletin-archive Office of bulletin-archive Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-237: TYPO3 Security Bypass Vulnerabilities http://energy.gov/cio/articles/v-237-typo3-security-bypass-vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities

57

ORISE: Incident Management Training Put to Test in Gulf  

NLE Websites -- All DOE Office Websites (Extended Search)

In his after-action analysis, Haley has been surprised by the number of similarities in response planning, even when disaster scenarios differ dramatically. "Like this incident,...

58

Components of an Incident Management Simulation and Gaming Framework and Related Developments  

Science Conference Proceedings (OSTI)

The nation's emergency responders need to work in a coordinated, well-planned manner to best mitigate the impact of an emergency incident. They need to be trained and ready to act in view of the increased security threat. The training has been traditionally ... Keywords: architecture, component, emergency response, gaming, incident management, integration, modeling, simulation

Sanjay Jain; Charles R. Mclean

2008-01-01T23:59:59.000Z

59

Risk-informed incident management for nuclear power plants  

E-Print Network (OSTI)

Decision making as a part of nuclear power plant operations is a critical, but common, task. Plant management is forced to make decisions that may have safety and economic consequences. Formal decision theory offers the ...

Smith, Curtis Lee, 1966-

2002-01-01T23:59:59.000Z

60

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

EP&R Standards Project Report: Technical Review of National Incident Management Standards  

SciTech Connect

The importance and necessity for a fully developed and implemented National Incident Management System (NIMS) has been demonstrated in recent years by the impact of national events such as Hurricane Katrina in 2005. Throughout the history of emergency response to major disasters, especially when multiple response organizations are involved, there have been systemic problems in the consistency and uniformity of response operations. Identifying national standards that support the development and implementation of NIMS is key to helping solve these systemic problems. The NIMS seeks to provide uniformity and consistency for incident management by using common terminology and protocols that will enable responders to coordinate their efforts to ensure an efficient response.

Stenner, Robert D.

2007-04-24T23:59:59.000Z

62

Implementation of the National Incident Management System (NIMS)/Incident Command System (ICS) in the Federal Radiological Monitoring and Assessment Center(FRMAC) - Emergency Phase  

SciTech Connect

Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, including acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS/ICS construct and Unified Command (UC) for management of a domestic incident. The NRP Nuclear/Radiological Incident Annex (NUC) further provides requirements and protocols for coordinating federal government capabilities to respond to nuclear/radiological Incidents of National Significance (INS) and other radiological incidents. When a FRMAC is established, it operates under the parameters of NIMS as defined in the NRP. FRMAC and its operations have been modified to reflect NIMS/ICS concepts and principles and to facilitate working in a Unified Command structure. FRMAC is established at or near the scene of the incident to coordinate radiological monitoring and assessment and is established in coordination with the U.S. Department of Homeland Security (DHS); the coordinating agency; other federal agencies; and state, local, and tribal authorities. However, regardless of the coordinating agency designation, U.S. Department of Energy (DOE) coordinates radiological monitoring and assessment activities for the initial phases of the offsite federal incident response through the Radiological Assistance Program (RAP) and FRMAC assets. Monitoring and assessment data are managed by FRMAC in an accountable, secure, and retrievable format. Monitoring data interpretations, including exposure rate contours, dose projections, and any requested radiological assessments are to be provided to the DHS; to the coordinating agency; and to state, local, and tribal government agencies.

NSTec Environmental Restoration

2007-04-01T23:59:59.000Z

63

Technical Review of Law Enforcement Standards and Guides Relative to Incident Management  

SciTech Connect

In an effort to locate potential law enforcement-related standards that support incident management, a team from the Pacific Northwest National Laboratory (PNNL) contacted representatives from the National Institute of Standards-Office of Law Enforcement Standards (NIST-OLES), National Institute of Justice (NIJ), Federal Bureau of Investigation (FBI), Secret Service, ASTM International committees that have a law enforcement focus, and a variety of individuals from local and regional law enforcement organizations. Discussions were held with various state and local law enforcement organizations. The NIJ has published several specific equipment-related law enforcement standards that were included in the review, but it appears that law enforcement program and process-type standards are developed principally by organizations that operate at the state and local level. Input is provided from state regulations and codes and from external non-government organizations (NGOs) that provide national standards. The standards that are adopted from external organizations or developed independently by state authorities are available for use by local law enforcement agencies on a voluntary basis. The extent to which they are used depends on the respective jurisdictions involved. In some instances, use of state and local disseminated standards is mandatory, but in most cases, use is voluntary. Usually, the extent to which these standards are used appears to depend on whether or not jurisdictions receive certification from a governing entity due to their use and compliance with the standards. In some cases, these certification-based standards are used in principal but without certification or other compliance monitoring. In general, these standards appear to be routinely used for qualification, selection for employment, and training. In these standards, the term Peace Officer is frequently used to refer to law enforcement personnel. This technical review of national law enforcement standards and guides identified the following four guides as having content that supports incident management: TE-02-02 Guide to Radio Communications Interoperability Strategies and Products OSHA 335-10N Preparing and Protecting Security Personnel in Emergencies NIJ 181584 Fire and Arson Scene Evidence: A Guide for Public Safety Personnel NIJ 181869 A Guide for Explosion and Bombing Scene Investigation In conversations with various state and local law enforcement officials, it was determined that the following National Fire Protection Association (NPFA) standards are generally recognized and tend to be universally used by law enforcement organizations across the country: NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs NFPA 1561 Standard on Fire Department Incident Management Systems NFPA 472 Standard for Competence of Responders to Hazardous Materials/Weapons of Mass Destruction Incidents (2008 Edition) NFPA 473 Standard for Competencies for EMS Personnel Responding to Hazardous Materials/Weapons of Mass Destruction Incidents (2008 Edition)

Stenner, Robert D.; Salter, R.; Stanton, J. R.; Fisher, D.

2009-03-24T23:59:59.000Z

64

National Incident Management System (NIMS) Standards Review Panel Workshop Summary Report  

SciTech Connect

The importance and need for full compliant implementation of NIMS nationwide was clearly demonstrated during the Hurricane Katrina event, which was clearly expressed in Secretary Chertoff's October 4, 2005 letter addressed to the State's governors. It states, ''Hurricane Katrina was a stark reminder of how critical it is for our nation to approach incident management in a coordinated, consistent, and efficient manner. We must be able to come together, at all levels of government, to prevent, prepare for, respond to, and recover from any emergency or disaster. Our operations must be seamless and based on common incident management doctrine, because the challenges we face as a nation are far greater than capabilities of any one jurisdiction.'' The NIMS is a system/architecture for organizing response on a ''national'' level. It incorporations ICS as a main component of that structure (i.e., it institutionalizes ICS in NIMS). In a paper published on the NIMS Website, the following statements were made: ''NIMS represents a core set of doctrine, principles, terminology, and organizational processes to enable effective, efficient and collaborative incident management at all levels. To provide the framework for interoperability and compatibility, the NIMS is based on a balance between flexibility and standardization.'' Thus the NIC is challenged with the need to adopt quality SDO generated standards to support NIMS compliance, but in doing so maintain the flexibility necessary so that response operations can be tailored for the specific jurisdictional and geographical needs across the nation. In support of this large and complex challenge facing the NIC, the Pacific Northwest National Laboratory (PNNL) was asked to provide technical support to the NIC, through their DHS Science and Technology ? Standards Portfolio Contract, to help identify, review, and develop key standards for NIMS compliance. Upon examining the challenge, the following general process appears to be a reasonable approach for identifying and establishing existing standards that would be applicable to NIMS compliance. The suggested generalized steps to establishing existing SDO generated standards for NIMS compliance are: (1) establish search criteria from the NIMS and its support documents, (2) search SDO databases to identify key existing nationally and/or internationally recognized standards that have potential application to NIMS compliance needs, (3) review the identified standards against the specific component needs of the NIMS, (4) identify the pertinent aspects/components of those identified standards that clearly address specific NIMS compliance needs, (5) establish a process to adopt the pertinent standards, which includes the generation of formalized FEMA Guidance that identifies the specific NIMS component compliance needs addressed in the respective standard, (6) develop performance criteria for which to measure compliance with the identified NIMS components addressed by the respective adopted standard, and (7) adopt the standard, publish the guidance and performance criteria, and incorporate it into routine FEMA/NIC NIMS management operations. This review process will also help identify real gaps in standards for which new NIMS specific standards should be developed. To jump start this process and hopefully identify some key ''low hanging fruit'' standards the NIC could use to begin such a process, a panel of first-responder experts (familiar with the current standards of common use in the first-responder community) from various response disciplines was formed and a workshop held. The workshop included a pre-workshop information gathering process. This report discusses the workshop and its findings in detail.

Stenner, Robert D.; Kirk, Jennifer L.; Stanton, James R.; Shebell, Peter; Schwartz, Deborah S.; Judd, Kathleen S.; Gelston, Gariann M.

2006-02-07T23:59:59.000Z

65

Gil Vega | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

for the Department's Joint Cybersecurity Coordination Center (JC3) and enterprise cyber incident management. Mr. Vega also provides executive leadership for the...

66

Attitudes and Perceptions of Texas Public Safety Training Officers Regarding the Effectiveness of the National Incident Management System (NIMS).  

E-Print Network (OSTI)

This thesis sought to understand reasons for noncompliant respondents and ineffective leadership in the National Incident Management System (NIMS) by Texas public safety training officers. Research has been conducted on the policies and their implications for NIMS, organizational culture and its impact on NIMS, and the hierarchy network of the Incident Command System (ICS). However, research evaluating the attitudes and perceptions regarding the effectiveness of NIMS is scarce. Training officers from rural fire departments, emergency medical services, and law enforcement agencies were the population for this study (n=33). The results of this study have implications for combined fire department, emergency medical services, and law enforcement training (interoperability), simplification of the management structure, and a mentoring program. This study should be explored further in an urban setting, based on this model. This study showed that respondents agreed that rural emergency responders tend to be noncompliant with NIMS. Respondents mentioned that rural emergency responders disagree with the effectiveness of NIMS. This study showed that a correlation occurred between the effectiveness of NIMS and the number of times a respondent was involved in a formal NIMS incident command. The following recommendations were made based on the findings and conclusions of this study. Researchers should continue to look at what public safety training officers believe affects the adaptability of NIMS. Training officers should consider contributing to the future NIMS curriculum. Training officers should focus on interoperability issues through increased field exercises. Research should be conducted to determine what improvements to curriculum effect future NIMS compliance. Further research should be conducted on the effectiveness of individual compliance, and achievement.

Wilson, Jason

2009-12-01T23:59:59.000Z

67

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2012 28, 2012 U-246: Tigase XMPP Dialback Protection Bypass Vulnerability A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions. August 27, 2012 U-245: Critical Java 0-day flaw exploited Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines August 27, 2012 U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks Several vulnerabilities were reported in McAfee Email Gateway. August 24, 2012 U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service A vulnerability was reported in libvirt. August 23, 2012 U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local

68

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2012 26, 2012 U-156: Red Hat update for JBoss Enterprise Portal Platform Update for JBoss Enterprise Portal Platform April 25, 2012 U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. April 24, 2012 U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. April 23, 2012 U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service Two vulnerabilities were reported in EMC Data Protection Advisor. A remote

69

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2013 8, 2013 V-087: Adobe Flash Player Two Vulnerabilities Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system. February 7, 2013 V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. February 6, 2013 V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks A vulnerability was reported in Cisco Unity Express. February 5, 2013 V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks Several vulnerabilities were reported in RSA Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities

70

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2012 10, 2012 U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. May 9, 2012 U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. May 8, 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may

71

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 22, 2013 February 22, 2013 V-097: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. February 21, 2013 V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. February 20, 2013 V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Oracle Java.

72

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

13, 2011 13, 2011 T-645: Microsoft Security Bulletin Advance Notification Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any detection tools relevant to the updates. June 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the

73

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

74

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

75

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2011 11, 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. July 8, 2011 T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker. July 7, 2011

76

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2011 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle filenames with meta characters during tab expansions. This may allow a context-dependent attacker to use a crafted filename to trick another user to execute arbitrary commands, which may allow the attacker to gain elevated privileges. April 4, 2011 T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

77

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. January 4, 2011 T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied

78

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. June 24, 2011 T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. June 23, 2011 T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases. June 22, 2011 T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute

79

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2011 26, 2011 T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. July 25, 2011 T-675: Apple Laptop Battery Interface Lets Local Users Deny Service Apple Laptop Battery Interface Lets Local Users Deny Service July 22, 2011 T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

80

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23, 2011 23, 2011 T-586: Microsoft Advisory about fraudulent SSL Certificates Microsoft Advisory about fraudulent SSL Certificates. March 22, 2011 T-585: Mac OS X v10.6.7 Security Update 2011-001 Mac OS Update: Mac OS 10.6.7 fixes multiple vulnerabilities in the following release. This update can be installed on non-startup volumes, but you should only do this if the current startup volume has already been updated to Mac OS X Server v10.6.7. The simplest way to avoid issues from an improper installation is to start up from the volume that you wish to update. March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2011 20, 2011 T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. January 19, 2011 T-537: Oracle Critical Patch Update Advisory - January 2011 A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required because of interdependencies by those security patches. Critical Patch Updates are cumulative. January 18, 2011 T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on

82

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2011 4, 2011 T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. March 11, 2011 T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 10, 2011 T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. March 9, 2011 T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Windows Remote Desktop Client. A remote

83

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24, 2012 24, 2012 U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions A vulnerability was reported in Apache CXF September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes. September 19, 2012 U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site

84

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 25, 2013 January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 24, 2013 V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions. January 23, 2013 V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in EMC AlphaStor. January 22, 2013 V-074: IBM Informix Genero libpng Integer Overflow Vulnerability

85

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2011 14, 2011 T-717: Microsoft Security Bulletin Summary for September 2011 Microsoft Security Bulletin Summary for September 2011. September 14, 2011 T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 13, 2011 T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. September 12, 2011 T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 8, 2011

86

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2013 26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command August 24, 2013 V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability A vulnerability has been reported in HP StoreOnce D2D Backup Systems. August 23, 2013 V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service A vulnerability was reported in McAfee Email Gateway. August 22, 2013 V-224: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome. August 21, 2013 V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts A remote user can make unlimited login attempts

87

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 22, 2013 March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services March 21, 2013 V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple iOS March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 18, 2013 V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code

88

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2012 29, 2012 U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. March 28, 2012 U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data. March 27, 2012 U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. March 26, 2012 U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can

89

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 1, 2011 March 1, 2011 T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. February 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 25, 2011 T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow

90

JC3 High Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

high-impact-assessment-bulletins high-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities http://energy.gov/cio/articles/v-215-networkminer-directory-traversal-and-insecure-library-loading-vulnerabilities V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities

91

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2013 January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 10, 2013 V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat January 9, 2013 V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code Security updates available for Adobe Flash Player January 8, 2013 V-064: Microsoft Security Bulletin Advance Notification for January 2013 Microsoft Security Bulletin Advance Notification for January 2013 . Microsoft has posted 2 Critical Bulletins and 5 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of

92

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on March

93

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 22, 2011 December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. December 20, 2011 U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. December 19, 2011 U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. December 16, 2011 U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code A remote user can cause the target application to execute arbitrary code on

94

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

95

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2012 11, 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12, 2012, at 11:00 AM Pacific Time (US & Canada). September 11, 2012 U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Apache Wicket September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities

96

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-207: Wireshark Multiple Denial of Service Vulnerabilities Successful exploitation of this vulnerability may allow execution of arbitrary code. July 30, 2013 V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities Two vulnerabilities have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the vulnerabilities are caused due to a bundled vulnerable version of Java. July 27, 2013 V-204: A specially crafted query can cause BIND to terminate abnormally A specially crafted query sent to a BIND nameserver can cause it to crash (terminate abnormally). July 26, 2013 V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and

97

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21, 2011 21, 2011 U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition October 20, 2011 U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. October 19, 2011 U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute

98

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12, 2012 12, 2012 U-146: Adobe Reader/Acrobat Multiple Vulnerabilities Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive information, and compromise a user's system. April 11, 2012 U-145: Microsoft Security Bulletin Summary for April 2012 Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). April 10, 2012 U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site

99

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2012 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain

100

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21, 2012 21, 2012 U-196: Cisco AnyConnect VPN Client Two Vulnerabilities Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. June 20, 2012 U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. June 19, 2012 U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges Users Gain Elevated Privileges June 18, 2012 U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

22, 2012 22, 2012 V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service). October 19, 2012 V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. October 18, 2012 V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions. October 17, 2012

102

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2013 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 26, 2013 V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability A security issue and a vulnerability have been reported in the Login Security module for Drupal June 25, 2013 V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability Apache has acknowledged a vulnerability in Apache OpenOffice SDK June 24, 2013 V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks A vulnerability was reported in Google Chrome.

103

JC3 Low Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

low-impact-assessment-bulletins low-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-207: Wireshark Multiple Denial of Service Vulnerabilities http://energy.gov/cio/articles/v-207-wireshark-multiple-denial-service-vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities

104

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2012 28, 2012 V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. December 27, 2012 V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. December 26, 2012 V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service A vulnerability was reported in Firefly Media Server December 25, 2012 V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM

105

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

106

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15, 2011 15, 2011 U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. November 14, 2011 U-035: Adobe Flash Player Multiple Vulnerabilities Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. November 10, 2011 U-034: Fraudulent Digital Certificates Could Allow Spoofing

107

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30, 2013 30, 2013 V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service) May 29, 2013 V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users Two vulnerabilities were reported in HP-UX Directory Server. May 28, 2013 V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server A vulnerability was reported in Cisco WebEx for iOS. May 27, 2013 V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The system does not properly validate all Inter-Satellite Sync operations

108

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9, 2011 9, 2011 U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges A vulnerability was reported in the Linux Kernel. December 8, 2011 U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. December 7, 2011 U-054: Security Advisory for Adobe Reader and Acrobat This U3D memory corruption vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that the vulnerability is being actively exploited in the wild in limited, targeted attacks against Adobe Reader 9.x on Windows. Adobe Reader X Protected Mode and Acrobat X Protected View

109

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 14, 2012 V-047: IBM Lotus Foundation Multiple Cross Site Scripting Two vulnerabilities have been reported in IBM Lotus Foundations. December 13, 2012 V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. December 12, 2012 V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions A vulnerability was reported in Adobe ColdFusion. December 11, 2012 V-044: IBM Informix Buffer Overflow in Processing SQL Statements Lets Remote Authenticated Users Execute Arbitrary Code A vulnerability was reported in IBM Informix. December 10, 2012 V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities Two vulnerabilities have been reported in Locale::Maketext module for Perl

110

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 T-636: Wireshark Multiple Flaws Let Remote Users Deny Service Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. June 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges

111

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bugs, and others likely to follow shortly. April 25, 2013 V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle...

112

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. June 5, 2012 U-183: ISC BIND DNS...

113

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 8, 2011 T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. August 5, 2011 T-685: Cisco Warranty CD May Load Malware From a Remote Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. August 3, 2011 T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. August 2, 2011 T-682:Double free vulnerability in MapServer MapServer developers have discovered flaws in the OGC filter support in

114

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2011 , 2011 T-547: Microsoft Windows Human Interface Device (HID) Vulnerability Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. January 31, 2011 T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. January 28, 2011 T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code A vulnerability was reported in RealPlayer. A remote user can cause

115

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2013 14, 2013 V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability This security update resolves a vulnerability in the Windows NAT Driver in Microsoft Windows August 12, 2013 V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 7, 2013 V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities

116

JC3 Medium Impact Assessment Bulletins  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

medium-impact-assessment-bulletins medium-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-237: TYPO3 Security Bypass Vulnerabilities http://energy.gov/cio/articles/v-237-typo3-security-bypass-vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities

117

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

118

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15, 2012 15, 2012 U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target August 14, 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 Microsoft Security Bulletin Advance Notification for August 2012. Microsoft has posted 5 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on August 15, 2012, at 11:00 AM Pacific Time (US & Canada). August 14, 2012 U-234: Oracle MySQL User Login Security Bypass Vulnerability

119

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. February 3, 2012 U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. February 1, 2012 U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information

120

A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry  

Science Conference Proceedings (OSTI)

The power industry faces the implementation of smart grids, which will introduce new information security threats to the power automation systems. The ability to appropriately prepare for, and respond to, information security incidents, is of utmost ... Keywords: Information security, incident respons, smart grids

Maria B. Line

2013-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Women @ Energy: Maria Stanton | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Stanton Stanton Women @ Energy: Maria Stanton March 15, 2013 - 1:19pm Addthis Ms. Maria Stanton is the Project Manager for Incident Management and the Joint Cyber Security Coordination Center (JC3). Ms. Maria Stanton is the Project Manager for Incident Management and the Joint Cyber Security Coordination Center (JC3). Check out other profiles in the Women @ Energy series and share your favorites on Pinterest. Ms. Maria Stanton is the Project Manager for Incident Management and the Joint Cyber Security Coordination Center (JC3). The JC3 maintains the information security of the Energy Department's network systems and operations by examining and mitigating cyber incidents and attacks, collecting threat information, and providing awareness of potential threats and incidents to internal organizations. Ms. Stanton is responsible for the

122

Incident Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Virus Pages Sophos Virus Info Page Symantec Trend Micro Virus Encyclopedia Virus Bulletin Home Page Cyber Security Sites AUSCERT FIRST NSA (National Security Agency) NVD (National...

123

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2013 1, 2013 V-059: MoinMoin Multiple Vulnerabilities Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. December 31, 2012 V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. December 27, 2012 V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. December 25, 2012

124

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2011 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates. May 31, 2011

125

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 10, 2012 July 10, 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 Microsoft Security Bulletin Advance Notification for July 2012. Microsoft has posted 3 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on July 11, 2012, at 11:00 AM Pacific Time (US & Canada). July 10, 2012 U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system July 2, 2012 U-203: HP Photosmart Bug Lets Remote Users Deny Service A vulnerability was reported in HP Photosmart. A remote user can cause

126

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

127

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 16, 2011 May 16, 2011 T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks The software does not properly filter HTML code from user-supplied input before displaying the input. May 13, 2011 T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user. May 10, 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011

128

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

129

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25, 2011 25, 2011 U-019: Oracle Critical Patch Update Advisory - October 2011 October 2011 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. October 25, 2011 U-018: Oracle AutoVue ActiveX Control Insecure Method Vulnerabilities Successful exploitation of the vulnerabilities allows execution of arbitrary code. October 20, 2011 U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. October 19, 2011 U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote

130

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 9, 2011 September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 7, 2011 T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks. September 6, 2011 T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. September 2, 2011 T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed By Remote Users Mac OS X keychain certificate settings can be bypassed by remote users September 1, 2011 T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code Pidgin bugs let remote users deny service and potentially execute arbitrary

131

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2012 3, 2012 U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service). August 2, 2012 U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability The Linux kernel is prone to a remote denial-of-service vulnerability. July 31, 2012 U-224: ISC DHCP Multiple Denial of Service Vulnerabilities ISC DHCP is prone to multiple denial-of-service vulnerabilities. July 25, 2012 U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache A remote user can poison the DNS cache. July 23, 2012 U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability System access from local network

132

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 26, 2011 October 26, 2011 U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI. October 24, 2011 U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information. October 21, 2011 U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability An unauthenticated, remote attacker could exploit this vulnerability to

133

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 6, 2012 November 6, 2012 V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities Two vulnerabilities were reported in Apache Tomcat October 23, 2012 V-008: Debian Security Advisory Debian update for bind9 October 22, 2012 V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service). October 18, 2012 V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users

134

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 12, 2013 August 12, 2013 V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks August 7, 2013 V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities The vulnerabilities can be exploited by malicious people to potentially compromise a user's system. August 6, 2013 V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service A vulnerability was reported in Samba August 3, 2013 V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

135

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2012 2, 2012 U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address. February 22, 2012 U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string. February 16, 2012 U-105:Oracle Java SE Critical Patch Update Advisory Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

136

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

137

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 13, 2012 September 13, 2012 U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code RSA BSAFE SSL-C Multiple Vulnerabilities September 12, 2012 U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code A remote user can cause arbitrary code to be executed on the target user's system. September 11, 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12,

138

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2013 29, 2013 V-144: HP Printers Let Remote Users Access Files on the Printer A vulnerability was reported in HP Printers. April 26, 2013 V-143: Fresh Java issues being exploited in the wild Java issues are being exploited in the wild by exploit kits, with Cool and Redkit specifically being known to use these bugs, and others likely to follow shortly. April 25, 2013 V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java. April 24, 2013 V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems A vulnerability was reported in HP ElitePad 900 April 19, 2013 V-138: Red Hat update for icedtea-web This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions

139

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 21, 2013 February 21, 2013 V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. February 20, 2013 V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Oracle Java. February 15, 2013 V-092: Pidgin Multiple Vulnerabilities Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. February 14, 2013

140

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 1, 2012 August 1, 2012 U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system. July 30, 2012 U-223: Bugzilla May Disclose Confidential Information to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information Multiple vulnerabilities were reported in Apple Safari. July 26, 2012 U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability ISC BIND is prone to a denial-of-service vulnerability. July 24, 2012

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2012 1, 2012 U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. April 30, 2012 U-158: HP NonStop Server Java Multiple Vulnerabilities Multiple vulnerabilities have been reported in HP NonStop Server April 24, 2012 U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. April 20, 2012 U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability The vulnerability is caused due to a type casting error in the

142

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 10, 2012 September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities September 6, 2012 U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks Barracuda Web Filter Authentification Module Multiple HTML Injection Vulnerabilities September 5, 2012 U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability September 4, 2012 U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service Wireshark is prone to a denial-of-service vulnerability. August 30, 2012 U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users Access

143

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 10, 2011 January 10, 2011 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. January 6, 2011 T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation

144

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 19, 2013 March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 15, 2013 V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. March 14, 2013 V-111: Multiple vulnerabilities have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. March 11, 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 Microsoft Security Bulletin Advance Notification for March 2013. Microsoft

145

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 30, 2011 December 30, 2011 U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service A remote user can cause performance to degrade on the target server. December 22, 2011 U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. December 15, 2011 U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability An attacker can exploit these issues by constructing and submitting a specially crafted SILC message. Successful exploits will cause the affected

146

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 28, 2012 November 28, 2012 V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Google Chrome. November 22, 2012 V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service Several vulnerabilities were reported in IBM WebSphere DataPower. November 21, 2012 V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service Adobe ColdFusion Denial of Service Vulnerability November 21, 2012 V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Multiple vulnerabilities were reported in Mozilla Firefox November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice

147

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 28, 2012 February 28, 2012 U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. February 27, 2012 U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service A remote user can send a specially crafted ICMP packet to cause the target service to crash. February 24, 2012 U-110: Samba Bug Lets Remote Users Execute Arbitrary Code A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. February 21, 2012 U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

148

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-127: Microsoft Security Bulletin MS12-020 - Critical Vulnerabilities in Remote Desktop Could Allow Remote Code Execution March 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability

149

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 27, 2011 January 27, 2011 T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities. January 27, 2011 T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker

150

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 26, 2012 January 26, 2012 U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands A remote user can execute arbitrary code on the target system. January 24, 2012 U-087: HP-UX update for Java Multiple vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information. January 18, 2012 U-083:Oracle Critical Patch Update Advisory - January 2012 Critical Patch Update contains 78 new security fixes across all listed product families. January 13, 2012 U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

151

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2011 1, 2011 T-547: Microsoft Windows Human Interface Device (HID) Vulnerability Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. January 25, 2011 T-542: SAP Crystal Reports Server Multiple Vulnerabilities Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. January 21, 2011

152

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 13, 2012 June 13, 2012 U-190: Microsoft Security Bulletin MS12-037 - Critical This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. June 12, 2012 U-188: MySQL User Login Security Bypass and Unspecified Vulnerability An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. June 11, 2012 U-187: Adobe Flash Player Multiple Vulnerabilities Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an

153

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-081: Wireshark Multiple Vulnerabilities Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 18, 2013 V-072: Red Hat update for java-1.7.0-openjdk Red Hat has issued an update for java-1.7.0-openjdk. January 15, 2013 V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code

154

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 28, 2012 December 28, 2012 V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. December 26, 2012 V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service A vulnerability was reported in Firefly Media Server December 24, 2012 V-053: Adobe Shockwave player installs Xtras without prompting A vulnerability was reported in Adobe Shockwave. December 21, 2012 V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities Drupal Core Multiple vulnerabilities December 19, 2012 V-050: IBM InfoSphere Information Server Multiple Vulnerabilities Multiple vulnerabilities have been reported in IBM InfoSphere Information

155

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 31, 2012 January 31, 2012 U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. January 30, 2012 U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic A remote user can decrypt SSL/TLS sessions in certain cases January 27, 2012 U-090: RSA enVision Discloses Environment Variable Information to Remote Users A remote user can view potentially sensitive data on the target system. January 25, 2012 U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain

156

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 2, 2013 July 2, 2013 V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue A a security issue in ASUS RT-N66U Router has been reported July 1, 2013 V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host A vulnerability was reported in Oracle VirtualBox. June 26, 2013 V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability A security issue and a vulnerability have been reported in the Login Security module for Drupal June 25, 2013 V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability Apache has acknowledged a vulnerability in Apache OpenOffice SDK June 24, 2013 V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks A vulnerability was reported in Google Chrome.

157

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 28, 2013 February 28, 2013 V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges A vulnerability was reported in McAfee VirusScan Enterprise. February 26, 2013 V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability A vulnerability has been reported in multiple Honeywell products. February 25, 2013 V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service A vulnerability was reported in the Linux Kernel. February 19, 2013 V-094: IBM Multiple Products Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in multiple IBM products. February 18, 2013 V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges Two vulnerabilities were reported in Symantec PGP Desktop.

158

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 27, 2011 September 27, 2011 T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. September 22, 2011 T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing Microsoft has released a Microsoft security advisory about this issue for IT professionals. September 21, 2011 T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target

159

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability Microsoft Office Visio contains a vulnerability that could allow an unauthenticated,...

160

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 17, 2012 October 17, 2012 V-004: Oracle Critical Patch Update Advisory - October 2012 October 2012 Critical Patch Update, security vulnerability fixes for proprietary components of Oracle Linux will be announced in Oracle Critical Patch Updates. October 16, 2012 V-003: Suse Update For Mozillafirefox - Critical An update that fixes 25 vulnerabilities is now available. October 12, 2012 V-001: Mozilla Security vulnerabilities Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities October 10, 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 Microsoft Security Bulletin Advance Notification for October 2012. Microsoft has posted 1 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12, 2011 12, 2011 U-058: Apache Struts Conversion Error OGNL Expression Injection Vulnerability Apache Struts Conversion Error OGNL Expression Injection Vulnerability. December 9, 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada). December 8, 2011 U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

162

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 29, 2011 July 29, 2011 T-679: VMware Security Advisory - VMSA-2011-0010 The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 20, 2011 T-672: Oracle Critical Patch Update Advisory - July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends

163

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2011 29, 2011 U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. December 28, 2011 U-070:Redhat krb5 Critical Security Update Vulnerability can be exploited by malicious people to compromise a vulnerable system. December 27, 2011 U-069: Telnet code execution vulnerability: FreeBSD and Kerberos Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. December 23, 2011 U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. December 22, 2011 U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities

164

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 28, 2011 July 28, 2011 T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service. July 27, 2011 T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability. July 26, 2011 T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. July 25, 2011 T-675: Apple Laptop Battery Interface Lets Local Users Deny Service Apple Laptop Battery Interface Lets Local Users Deny Service

165

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 11, 2011 April 11, 2011 T-599: Microsoft April 2011 Security Bulletin Release Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. April 6, 2011 T-596: 0-Day Windows Network Interception Configuration Vulnerability The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. April 5, 2011 T-595: OpenSUSE aaabase-filename-privilege-escalation OpenSUSE contains a flaw related to aaa_base failing to properly handle

166

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 15, 2011 November 15, 2011 U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. November 14, 2011 U-035: Adobe Flash Player Multiple Vulnerabilities Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should update to Adobe AIR 3.1.0.4880. November 10, 2011 U-034: Fraudulent Digital Certificates Could Allow Spoofing

167

ORISE: Incident Command System (ICS) Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Incident Command System (ICS) Training Incident Command System (ICS) Training The Oak Ridge Institute for Science and Education (ORISE) supports the emergency response community by promoting interagency cooperation and developing training that enhances response efforts. An example of such support involves the U.S. Department of Energy (DOE) Office of Emergency Response and its compliance efforts toward the Homeland Security Presidential Directive-5 (HSPD-5), which includes the implementation of National Incident Management System (NIMS)/Incident Command System (ICS) and the National Response Framework (NRF). The ICS, which has been recognized for its training curricula that has exceeded national standards, is an on-scene, all-hazard incident management concept that was originally designed for emergency management agencies, but

168

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

169

Radioactive Materials Transportation and Incident Response  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FEMA 358, 05/10 FEMA 358, 05/10 Q A RADIOACTIVE MATERIALS Transportation Emergency Preparedness Program U.S. Department of Energy TRANSPORTATION AND INCIDENT RESPONSE Q&A About Incident Response Q Q Law Enforcement ____________________________________ Fire ___________________________________________ Medical ____________________________________________ State Radiological Assistance ___________________________ Local Government Official ______________________________ Local Emergency Management Agency ___________________ State Emergency Management Agency ___________________ HAZMAT Team ______________________________________ Water Pollution Control ________________________________ CHEMTEL (Toll-free US & Canada) 1-800-255-3924 _________ CHEMTREC (Toll-free US & Canada) 1-800-424-9300 _______

170

Cyber Incidents Involving Control Systems  

Science Conference Proceedings (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

171

Incident Handling Activities  

Science Conference Proceedings (OSTI)

[an error occurred while processing this directive] Incident Handling Activities. Since 1989 the National Institute of Standards ...

172

Chapter_11_Incidents_of_Security_Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. HS-91 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect the safeguards and security program's capability to protect DOE safeguards and security interests * Indicate failure to adhere to security procedures * Reveal that the system is not functioning properly, by identifying and/or mitigating potential threats (e.g., detecting suspicious activity, hostile acts, etc.).

173

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyberincident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable...

174

January 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyberincident that occurred in mid-January 2013 which targeted the Headquarters'network and resulted in the unauthorized disclosure of...

175

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information ...

176

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

177

Incident Investigation and Reporting  

Science Conference Proceedings (OSTI)

This report presents a model procedure for incident investigations based on an examination of programs at fourteen utilities believed to have good and effective procedures. The model was compiled by an expert who also drew on materials from other industries. An outline presents the basic procedure while the main text discusses in more detail alternate methods that may be preferable for a specific utility.

2003-05-19T23:59:59.000Z

178

DHS National Incident  

Science Conference Proceedings (OSTI)

Page 1. Transforming Federal Cyber Security Management June 12, 2013 1 Page 2. Outline 1. Securing .gov 2. Why CDM1? ...

2013-06-17T23:59:59.000Z

179

RFI - Comments on Computer Security Incident Coordination  

Science Conference Proceedings (OSTI)

... 21:49 To: incidentcoordination@nist.gov Subject: Computer Security Incident Coordination (CSIC): Providing Timely Cyber Incident Response ...

2013-08-19T23:59:59.000Z

180

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ability to positively influence driver behaviour and also drivers ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Computerized Accident Incident Reporting System  

Energy.gov (U.S. Department of Energy (DOE))

The Computerized Accident/Incident Reporting System is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE...

182

Use of incident databases for cause and consequence analysis and national estimates  

E-Print Network (OSTI)

Many incidents have occurred because industries have ignored past incidents or failed to learn lessons from the past. Incident databases provide an effective option for managing large amounts of information about the past incidents. Analysis of data stored in existing databases can lead to useful conclusions and reduction of chemical incidents and consequences of incidents. An incident database is a knowledge based system that can give an insight to the situation which led to an incident. Effective analysis of data from a database can help in development of information that can help reduce future incidents: cause of an incident, critical equipment, the type of chemical released, and the type of injury and victim. In this research, Hazardous Substances Emergency Events Surveillance (HSEES) database has been analyzed focusing on manufacturing events in Texas from 1993-2004. Between thirteen to sixteen states have participated in the HSEES incident reporting system and it does not include all the near miss incidents. Petroleum related incidents are also excluded from the HSEES system. Studies show that HSEES covers only 37% of all incidents in the US. This scaling ratio was used to estimate the total universe size.

Obidullah, A.S.M.

2006-12-01T23:59:59.000Z

183

ORISE: REAC/TS Radiological Incident Medical Consultation  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiological Incident Medical Consultation Radiological Incident Medical Consultation Radiological Incident Medical Consultation The Oak Ridge Institute for Science and Education (ORISE) provides the U.S. Department of Energy (DOE) with a comprehensive capability to respond effectively to medical emergencies involving radiological or nuclear materials. Through the management of the Radiation Emergency Assistance Center/Training Site (REAC/TS), ORISE provides advice and consultation to emergency personnel responsible for the medical management of radiation accidents. REAC/TS strengthens hospital preparedness for radiation emergencies by preparing and educating first responders, medical personnel and occupational health professionals who will provide care to patients with a radiation injury or illness. REAC/TS staff provide medical advice,

184

MIDAS : minor incident decision analysis software  

E-Print Network (OSTI)

MIDAS is the minor incident decision analysis software that acts as an advisory tool for plant decision makers and operators to analyze the available decision alternatives for resolving minor incidents. The minor incidents ...

Horng, Tze-Chieh, 1964-

2004-01-01T23:59:59.000Z

185

LANL responds to radiological incident  

NLE Websites -- All DOE Office Websites (Extended Search)

LANL responds to radiological incident LANL responds to radiological incident LANL responds to radiological incident Multiple tests indicate no health risks to public or employees. August 27, 2012 Aerial view of the Los Alamos Neutron Science Center(LANSCE). Aerial view of the Los Alamos Neutron Science Center (LANSCE). The contamination poses no danger to the public. The Laboratory is investigating the inadvertent spread of Technetium 99 by employees and contractors at the Lujan Neutron Scattering Center August 27, 2012-The Laboratory is investigating the inadvertent spread of Technetium 99 by employees and contractors at the Lujan Neutron Scattering Center at the Los Alamos Neutron Science Center (LANSCE), a multidisciplinary accelerator facility used for both civilian and national security research. The Laboratory has determined that about a dozen people

186

Active and Knowledge-based Process Safety Incident Retrieval System  

E-Print Network (OSTI)

The sustainability and continued development of the chemical industry is to a large extent dependent on learning from past incidents. The failure to learn from past mistakes is rather not deliberate but due to unawareness of the situation. Incident databases are excellent resources to learn from past mistakes; however, in order to be effective, incident databases need to be functional in disseminating the lessons learned to users. Therefore, this research is dedicated to improving user accessibility of incident databases. The objective of this research is twofold. The first objective is improving accessibility of the database system by allowing the option of word search as well as folder search for the users. This will satisfy research needs of users who are aware of the hazards at hand and need to access the relevant information. The second objective is to activate the database via integration of the database with an operational software. This will benefit research needs of users who are unaware of the existing hazards. Literature review and text mining of Major Accident Reporting System (MARS) database short reports are employed to develop an initial taxonomy, which is then refined and modified by expert review. The incident reports in MARS database is classified to the right folders in the taxonomy and implemented in a database system based on Microsoft Excel, where the users can retrieve information using folder search as well as word search option via a user friendly interface. A program coded in JAVA is prepared for integrating the incident database with a Management of Change (MOC) software prototype. A collection of keywords on hazardous substances and equipment is prepared. If the keywords exist in the MOC interface, they will be highlighted, and with the click of a button, will return up to ten relevant incident reports. Using an active and knowledge-based system, people can learn from incidents and near-misses and will be more active to reduce the frequency of recurring incidents.

Khan, Sara Shammni

2010-08-01T23:59:59.000Z

187

Radioactive Materials Transportation and Incident Response  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FEMA 358, 0510 Q A RADIOACTIVE MATERIALS Transportation Emergency Preparedness Program U.S. Department of Energy TRANSPORTATION AND INCIDENT RESPONSE Q&A About Incident Response Q...

188

Incident  

E-Print Network (OSTI)

to a fire at an oilfield waste disposal facility (hereafter, disposal facility) near Rosharon, Texas, south of Houston. The fire occurred as two vacuum trucks were off-loading liquid wastes from oil and gas production wells. The trucks arrived at the disposal facility within a few minutes of each other and were parked approximately 16 feet apart. The two drivers got out of their trucks, left the engines running, and told the disposal facility employees that the trucks were to be drained and rinsed out. Both drivers then went to the drivers shed to complete paperwork and to wait for the washout to be completed. (1) The fire was caused by the ignition of hydrocarbon vapor released during the off-loading of basic

unknown authors

2003-01-01T23:59:59.000Z

189

Evaluation of the integrated application of intelligent transportation system technologies using stochastic incident generation and resolution modeling  

Science Conference Proceedings (OSTI)

This paper presents the use of the microscopic vehicle traffic simulation software PARAMICS to evaluate different incident management implementation alternatives in South Carolina. This study customized the simulation model for random spatial and temporal ... Keywords: freeway service patrol, intelligent transportation systems, traffic incident management, traffic simulation

Yongchang Ma; Ryan Fries; Mashrur Chowdhury; Imran Inamdar

2012-01-01T23:59:59.000Z

190

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

191

Definition: Angle of incidence | Open Energy Information  

Open Energy Info (EERE)

Angle of incidence Angle of incidence Jump to: navigation, search Dictionary.png Angle of incidence In reference to solar energy systems: the angle a ray of sun makes with a line perpendicular to a surface; for example, a surface directly facing the sun has an angle of incidence of zero, and a surface parallel to the sun (such as a sunrise striking a horizontal rooftop) has an angle of incidence of 90°. Sunlight with an incident angle of 90° tends to be absorbed, while lower angles tend to be reflected.[1][2] View on Wikipedia Wikipedia Definition Angle of incidence is a measure of deviation of something from "straight on", for example: in the approach of a ray to a surface, or the angle at which the wing or horizontal tail of an airplane is installed on the fuselage, measured relative to the axis of the fuselage.

192

Women @ Energy: Cereda Amos | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cereda Amos Cereda Amos Women @ Energy: Cereda Amos March 14, 2013 - 4:23pm Addthis Cereda Amos joined the Department of Energy, Office of the Chief Information Officer in October of 2011 as the Joint Cybersecurity Coordination Center (JC3) Program Manager and was brought on board to work on the development phase of JC3. Cereda Amos joined the Department of Energy, Office of the Chief Information Officer in October of 2011 as the Joint Cybersecurity Coordination Center (JC3) Program Manager and was brought on board to work on the development phase of JC3. Cereda Amos joined the Department of Energy, Office of the Chief Information Officer in October of 2011 as the Joint Cybersecurity Coordination Center (JC3) Program Manager and was brought on board to work on the development phase of JC3. Prior to that, Cereda was with the

193

2013 New York Wildfire and Incident Management Academy  

NLE Websites -- All DOE Office Websites (Extended Search)

of toiletries) are located in the Post Office (www.bnl.govmapspoint.php?Lat40.86776&Lng-72.88106) (Building 179) and the Research Support Building (www.bnl.govguvmap.asp)...

194

2013 New York Wildfire and Incident Management Academy  

NLE Websites -- All DOE Office Websites (Extended Search)

List of Registered Attendees Food at BNL Local Weather at BNL Visiting BNL Disclaimer 2013 Wildfire Academy Event Registration Process for Brookhaven National Laboratory NY...

195

2013 New York Wildfire and Incident Management Academy  

NLE Websites -- All DOE Office Websites (Extended Search)

1-800-HAMPTON Fax: 1-631-732-5522 Group Code: NYW Reservation Cutoff Date: November 04, 2013 Method of Payment: Self-Pay (credit card) A block of rooms at the Hampton Inn have been...

196

Dynamic detection of nuclear reactor core incident  

Science Conference Proceedings (OSTI)

Surveillance, safety and security of evolving systems are a challenge to prevent accident. The dynamic detection of a hypothetical and theoretical blockage incident in the Phenix nuclear reactor is investigated. Such an incident is characterized by abnormal ... Keywords: Contrast, Dynamic detection of perturbations, Evolving system, Fast-neutron reactor, Neighbourhood, Noise

Laurent Hartert; Danielle Nuzillard; Jean-Philippe Jeannot

2013-02-01T23:59:59.000Z

197

Analysis of the HSEES Chemical Incident Database Using Data and Text Mining Methodologies  

E-Print Network (OSTI)

Chemical incidents can be prevented or mitigated by improving safety performance and implementing the lessons learned from past incidents. Despite some limitations in the range of information they provide, chemical incident databases can be utilized as sources of lessons learned from incidents by evaluating patterns and relationships that exist between the data variables. Much of the previous research focused on studying the causal factors of incidents; hence, this research analyzes the chemical incidents from both the causal and consequence elements of the incidents. A subset of incidents data reported to the Hazardous Substance Emergency Events Surveillance (HSEES) chemical incident database from 2002-2006 was analyzed using data mining and text mining methodologies. Both methodologies were performed with the aid of STATISTICA software. The analysis studied 12,737 chemical process related incidents and extracted descriptions of incidents in free-text data format from 3,316 incident reports. The structured data was analyzed using data mining tools such as classification and regression trees, association rules, and cluster analysis. The unstructured data (textual data) was transformed into structured data using text mining, and subsequently analyzed further using data mining tools such as, feature selections and cluster analysis. The data mining analysis demonstrated that this technique can be used in estimating the incident severity based on input variables of release quantity and distance between victims and source of release. Using the subset data of ammonia release, the classification and regression tree produced 23 final nodes. Each of the final nodes corresponded to a range of release quantity and, of distance between victims and source of release. For each node, the severity of injury was estimated from the observed severity scores' average. The association rule identified the conditional probability for incidents involving piping, chlorine, ammonia, and benzene in the value of 0.19, 0.04, 0.12, and 0.04 respectively. The text mining was utilized successfully to generate elements of incidents that can be used in developing incident scenarios. Also, the research has identified information gaps in the HSEES database that can be improved to enhance future data analysis. The findings from data mining and text mining should then be used to modify or revise design, operation, emergency response planning or other management strategies.

Mahdiyati, -

2011-05-01T23:59:59.000Z

198

USD(AT&L) SUBJECT: DoD Response to Nuclear and Radiological Incidents References: See Enclosure 1  

E-Print Network (OSTI)

establish policy and assign responsibilities for the DoD consequence management response to U.S. nuclear weapon incidents and other nuclear or radiological incidents involving materials in DoD custody in accordance with the guidance in National Security Presidential Directive (NSPD) 28, the National Response Framework, and the National Incident Management System (References (b) through (d)). 2. APPLICABILITY. This Directive applies to: a. OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the

unknown authors

2010-01-01T23:59:59.000Z

199

Overview of Incidents Related to Live Working  

Science Conference Proceedings (OSTI)

This report is a summary of progress in the research on injury and fatality information among workers who perform energized (live) and/or de-energized work. While every effort is made in the industry to avoid incidents during work on energized and de-energized lines, they do occur, and there are lessons embedded within every incident from which the utility industry can benefit, if the incidents are thoroughly analyzed, root causes are identified, and corrective actions are taken. The primary objective of...

2006-03-30T23:59:59.000Z

200

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

202

Nuclear Incident Team | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

203

Computerized Accident/Incident Reporting System  

NLE Websites -- All DOE Office Websites (Extended Search)

Accident Recordkeeping and Reporting Accident Recordkeeping and Reporting Accident/Incident Recordkeeping and Reporting CAIRS logo Computerized Accident Incident Reporting System CAIRS Database The Computerized Accident/Incident Reporting System is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE operations. Injury and Illness Dashboard The Dashboard provides an alternate interface to CAIRS information. The initial release of the Dashboard allows analysis of composite DOE-wide information and summary information by Program Office, and site. Additional data feature are under development. CAIRS Registration Form CAIRS is a Government computer system and, as such, has security requirements that must be followed. Access to the

204

Incidence of Hepatocellular Carcinoma in Southeast Iran  

E-Print Network (OSTI)

Background and Aims: Hepatocellular carcinoma (HCC) is a well-known consequence of chronic liver disease (CLD). The aim of this study was to extract the HCC incidence rate in the province of Kerman, located in southern part of Iran, and compare the data with other parts of the country. Materials and Methods: All medical records related to HCC were collected through hospitals or outpatient services in public or private centers. The records of all oncology, radiotherapy, and pathology centers in Kerman province were actively searched between 1999 and 2006. The annual incidence of HCC around the country was calculated, using the

A Rticle; Sodaif Darvish Moghaddam; Ali-akbar Haghdoost; Seyed Hamed Hoseini; Rashid Ramazani; Mohammad Rezazadehkermani

2010-01-01T23:59:59.000Z

205

March 26, 2013 IT Service Manager Tips & Tricks  

E-Print Network (OSTI)

Manager Archive. 3. Enter terms and values that reference your ticket (e.g. Interaction ID, Incident ID home page Tip 5: Use Global Issues only for P1 and P2 level incidents Tip 6: Search archived HP Service-down select IT Service Manager. 5. Refine your search using keywords. * Use "AND" or "OR" when searching

Chisholm, Rex L.

206

Incident and Disaster Tolerance/Response Policy COEIDTR01  

E-Print Network (OSTI)

Incident and Disaster Tolerance/Response Policy COE­IDTR­01 1.0 Purpose To provide College faculty or disaster within a College-operated network closet. 2.0 Scope 2.1 Incident Response: Incident response for developing and implementing Disaster Tolerance/Recovery plans. 3.0 Policy 3.1 Incident Response: Any desktop

Demirel, Melik C.

207

Training reduces stuck pipe costs and incidents  

SciTech Connect

Properly administered initial and refresher stuck pipe training courses have dramatically reduced the cost and number of stuck pipe incidents for many companies worldwide. These training programs have improved operator and contractor crew awareness of stuck pipe risks and fostered a team commitment in averting such incidents. The success is evident in the achievements of the companies sponsoring such training. Preventing and minimizing stuck pipe is the most significant benefit of stuck pipe training, but crews also benefit from becoming more knowledgeable about the drilling program and equipment operation. The paper discusses stuck pipe costs, stuck pipe training, prevention of stuck pipes, well bore stability, geopressured formation, reactive formation, reactive formations, unconsolidated formations, mobile formations, fractured and faulted formations, differential sticking, 8 other causes of stuck pipe, and freeing stuck pipe.

Watson, B. (Global Marine Drilling Co., Houston, TX (United States)); Smith, R. (Randy Smith Drilling School, Lafayette, LA (United States))

1994-09-19T23:59:59.000Z

208

Cancer incidence in atomic bomb survivors. Part IV: Comparison of cancer incidence and mortality  

SciTech Connect

This report compares cancer incidence and mortality among atomic bomb survivors in the Radiation Effects Research Foundation Life Span Study (LSS) cohort. Because the incidence data are derived from the Hiroshima and Nagasaki tumor registries, case ascertainment is limited to the time (1958-1987) and geographic restrictions (Hiroshima and Nagasaki) of the registries, whereas mortality data are available from 1950-1987 anywhere in Japan. With these conditions, there were 9,014 first primary incident cancer cases identified among LSS cohort members compared with 7,308 deaths for which cancer was listed as the underlying cause of death on death certificates. When deaths were limited to those occurring between 1958-1987 in Hiroshima or Nagasaki, there were 3,155 more incident cancer cases overall, and 1,262 more cancers of the digestive system. For cancers of the oral cavity and pharynx, skin, breast, female and male genital organs, urinary system and thyroid, the incidence series was at least twice as large as the comparable mortality series. Although the incidence and mortality data are dissimilar in many ways, the overall conclusions regarding which solid cancers provide evidence of a significant dose response generally confirm the mortality findings. When either incidence or mortality data are evaluated, significant excess risks are observed for all solid cancers, stomach, colon, liver (when it is defined as primary liver cancer or liver cancer not otherwise specified on the death certificate), lung, breast, ovary and urinary bladder. No significant radiation effect is seen for cancers of the pharynx, rectum, gallbladder, pancreas, nose, larynx, uterus, prostate or kidney in either series. There is evidence of a significant excess of nonmelanoma skin cancer in the incidence data, but not in the mortality series. 19 refs., 2 figs., 10 tabs.

Ron, E. (Radiation Effects Research Foundation, Hiroshima (Japan) National Cancer Institute, Bethesda, MD (United States)); Preston, D.L.; Mabuchi, Kiyohiko (Radiation Effects Research Foundation, Hiroshima (Japan)); Thompson, D.E. (Radiation Effects Research Foundation, Hiroshima (Japan) George Washington Univ., Rockville, MD (United States) Radiation Effects Research Foundation, Nagasaki (Japan)); Soda, Midori (Radiation Effects Research Foundation, Nagasaki (Japan))

1994-02-01T23:59:59.000Z

209

Risk Insights Gained from Fire Incidents  

SciTech Connect

There now exist close to 20 years of history in the application of Probabilistic Risk Assessment (PRA) for the analysis of fire risk at nuclear power plants. The current methods are based on various assumptions regarding fire phenomena, the impact of fire on equipment and operator response, and the overall progression of a fire event from initiation through final resolution. Over this same time period, a number of significant fire incidents have occurred at nuclear power plants around the world. Insights gained from US experience have been used in US studies as the statistical basis for establishing fire initiation frequencies both as a function of the plant area and the initiating fire source.To a lesser extent, the fire experience has also been used to assess the general severity and duration of fires. However, aside from these statistical analyses, the incidents have rarely been scrutinized in detail to verify the underlying assumptions of fire PRAs. This paper discusses an effort, under which a set of fire incidents are being reviewed in order to gain insights directly relevant to the methods, data, and assumptions that form the basis for current fire PRAs. The paper focuses on the objectives of the effort, the specific fire events being reviews methodology, and anticipated follow-on activities.

Kazarians, Mardy; Nowlen, Steven P.

1999-06-10T23:59:59.000Z

210

Management Plan Management Plan  

E-Print Network (OSTI)

of a coevolving naturalcultural system. Suitable ecosystem attributes can be achieved by managing human maintenance that protects the riparian corridor. · Manage recreational use to protect riparian values Creek and the Warm Springs River during runoff periods. · Road systems and upland management practices

211

Catastrophic Incident Recovery: Long-Term Recovery from an Anthrax Event Symposium  

Science Conference Proceedings (OSTI)

On March 19, 2008, policy makers, emergency managers, and medical and Public Health officials convened in Seattle, Washington, for a workshop on Catastrophic Incident Recovery: Long-Term Recovery from an Anthrax Event. The day-long symposium was aimed at generating a dialogue about restoration and recovery through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems.

Lesperance, Ann M.

2008-06-30T23:59:59.000Z

212

Emergency Management Plan 2010 March 1 EMERGENCY MANAGEMENT PLAN  

E-Print Network (OSTI)

or Disaster 3.1 Initiation of Level 2 and 3 Emergency Response 4. Activation of Emergency Management Plan.......................................................................................................... 5 1. Emergency Response Levels 2. Planning and Implementation Principles 3. Incident Command System and Authority of Director of Emergency Operations Response Procedures

Argerami, Martin

213

NIST Calls for Suggestions to Speed Computer Incident ...  

Science Conference Proceedings (OSTI)

NIST Calls for Suggestions to Speed Computer Incident Teams Responses. From NIST Tech Beat: June 28, 2013. ...

2013-07-10T23:59:59.000Z

214

Hazardous Materials Incident Response Procedure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hazardous Materials Incident Response Procedure Hazardous Materials Incident Response Procedure Hazardous Materials Incident Response Procedure The purpose of this procedure is to provide guidance for developing an emergency response plan, as outlined in OSHA's 29 CFR 1910.120(q), for facility response. This model has been adopted and applied to work for response to transportation accidents involving radioactive material or other hazardous materials incidents Hazardous Materials Incident Response Procedure.docx More Documents & Publications Handling and Packaging a Potentially Radiologically Contaminated Patient Decontamination Dressdown at a Transportation Accident Involving Radioactive Material Medical Examiner/Coroner on the Handling of a Body/Human Remains that are Potentially Radiologically Contaminated

215

Injury / Incident Report INSTRUCTIONS ON REVERSE  

E-Print Network (OSTI)

TRAINING 4 UNSAFE EQUIPMENT / POOR DESIGN 5 INSUFFICIENT CARE 6 IMPROPER POSITION OR POSTURE 7 FAILURE ORDER JOB SAFETY ANALYSIS DONE 4 IMPROVED PERSONAL PROTECTIVE EQUIPMENT 5 EQUIPMENT REPAIR TO BE USED FOR COMPLETION OF WSIB CLAIM FORM #7 WHITE COPY - Department Chair, Manager or Director YELLOW

Hitchcock, Adam P.

216

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

3MS Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs AN L-934 Surveillance of Site A and Plot M...

217

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs AN L-9213 Surveillance of Site A and Plot M Report...

218

Management Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

r Environment and Waste Management Programs Environment and Waste Management Programs Environment and Waste Management Programs ANL-949 Surveillance of Site A and Plot M Report...

219

Figure and finish of grazing incidence mirrors  

SciTech Connect

Great improvement has been made in the past several years in the quality of optical components used in synchrotron radiation (SR) beamlines. Most of this progress has been the result of vastly improved metrology techniques and instrumentation permitting rapid and accurate measurement of the surface finish and figure on grazing incidence optics. A significant theoretical effort has linked the actual performance of components used as x-ray wavelengths to their topological properties as measured by surface profiling instruments. Next-generation advanced light sources will require optical components and systems to have sub-arc second surface figure tolerances. This paper will explore the consequences of these requirements in terms of manufacturing tolerances to see if the present manufacturing state-of-the-art is capable of producing the required surfaces. 15 refs., 14 figs., 2 tabs.

Takacs, P.Z. (Brookhaven National Lab., Upton, NY (USA)); Church, E.L. (Picatinny Arsenal, Dover, NJ (USA). Army Armament Research, Development and Engineering Center)

1989-08-01T23:59:59.000Z

220

ORISE: National Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Emergency Management Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is Making a Difference Overview Exercises and Planning Training and Technology Support Resources How to Work With Us Contact Us Oak Ridge Institute for Science Education National Security and Emergency Management The Oak Ridge Institute for Science and Education (ORISE) helps prepare the U.S. Department of Energy's (DOE) emergency response assets, as well as those of other federal and state agencies, by managing and conducting programs, studies, research, exercises and training. ORISE's national security and emergency management capabilities include: Providing incident response where weapons of mass destruction and/or improvised explosive devices are involved

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Recent Racial Incidents in Higher Education: A Contemporary Perspective  

E-Print Network (OSTI)

Racial Incidents in Higher Education 1987b. "King Wants1988. "Hispanics Higher Education's Missing People." Change12-65. Chronicle of Higher Education. 1987. "Racial Brawl

Farrell, Walter C. Jr.; Jones, Cloyzelle K.

1988-01-01T23:59:59.000Z

222

Model Recovery Procedure for Response to a Radiological Transportation Incident  

Energy.gov (U.S. Department of Energy (DOE))

This Transportation Emergency Preparedness Program (TEPP) Model Recovery Procedure contains the recommended elements for developing and conducting recovery planning at transportation incident scene...

223

PLUTONIUM RELEASE INCIDENT OF NOVEMBER 20, 1959  

SciTech Connect

A nonnuclear explosion involving an evaporator occurred in a shielded cell in the Radiochemical Processing Pilot Plant at Oak Ridge National Laboratory on Nov. 20, 1959. Plutonium was released from the processing cell, probably as an aerosol of fine particles of plutonium oxide. It is probable that this evaporator system had accumulated -1100 g of nitric acid-insoluble plutonium in the steam stripper packing; the explosion released an estimated 150 g inside Cell 6, with about 135 g in the evaporator subcell, and about 15 g in the larger main cell. No radioactive material was released from the ventilation stacks; no contamination of grounds and facilities occurred outside of a relatively small area of OaK Ridge National Laboratory immediately adjacent to the explosion. No one was injured by the explosion, and no one received more than 2% of a lifetime body burden of plutonium or an overexposure to sources of ionizing radiation either at the time of the incident or daring subsequent cleanup operations. The explosion is considerdd to be the result of rapid reaction of nitrated organic compounds formed by the inadvertent nitration of about 14 liters of a proprietary decontaminating reagent. In cleanup the contamination was bonded to the nearby street and building surfaces with tar, paint, roofing compound, or masonry sealer, as appropriate to the surface. Decontamination of the interior of the pilot-plant building, except the processing cells, was 95% complete on Sept. 1, 1960. Decontamination of the processing cells was delayed 8 months until building modifications could be made to improve containment. Modifications to the pilot plant have been proposed which will preclude dischanges into the laboratory area and its environment of concentrations or amounts of radioactive materials that would be injurious to health or interfere with other laboratory programs. (auth)

King, L.J.; McCarley, W.T.

1961-02-16T23:59:59.000Z

224

Spatial Estimation of Populations at Risk from Radiological Dispersion Device Terrorism Incidents  

Science Conference Proceedings (OSTI)

Delineation of the location and size of the population potentially at risk of exposure to ionizing radiation is one of the key analytical challenges in estimating accurately the severity of the potential health effects associated with a radiological terrorism incident. Regardless of spatial scale, the geographical units for which population data commonly are collected rarely coincide with the geographical scale necessary for effective incident management and medical response. This paper identifies major government and commercial open sources of U.S. population data and presents a GIS-based approach for allocating publicly available population data, including age distributions, to geographical units appropriate for planning and implementing incident management and medical response strategies. In summary: The gravity model offers a straight-forward, empirical tool for estimating population flows, especially when geographical areas are relatively well-defined in terms of accessibility and spatial separation. This is particularly important for several reasons. First, the spatial scale for the area impacted by a RDD terrorism event is unlikely to match fully the spatial scale of available population data. That is, the plume spread typically will not uniformly overlay the impacted area. Second, the number of people within the impacted area varies as a function whether an attack occurs during the day or night. For example, the population of a central business district or industrial area typically is larger during the day while predominately residential areas have larger night time populations. As a result, interpolation techniques that link population data to geographical units and allocate those data based on time-frame at a spatial scale that is relevant to enhancing preparedness and response. The gravity model's main advantage is that it efficiently allocates readily available, open source population data to geographical units appropriate for planning and implementing incident management and medical monitoring strategies. The importance of being able to link population estimates to geographic areas during the course of an RDD incident can be understood intuitively: - The spatial distribution of actual total dose equivalents of ionizing radiation is likely to vary due to changes in meteorological parameters as an event evolves over time; - The size of the geographical area affected also is likely to vary as a function of the actual release scenario; - The ability to identify the location and size of the populations that may be exposed to doses of ionizing radiation is critical to carrying out appropriate treatment and post-event medical monitoring; - Once a spatial interaction model has been validated for a city or a region, it can then be used for simulation and prediction purposes to assess the possible human health consequences of different release scenarios. (authors)

Regens, J.L.; Gunter, J.T. [Center for Biosecurity Research, University of Oklahoma Health Sciences Center, Oklahoma City, OK (United States)

2008-07-01T23:59:59.000Z

225

Database of Incidents and Near Misses in Switching  

Science Conference Proceedings (OSTI)

In 2008, EPRI published a Technical Update report, "Database of Incidents and Near Misses in Power Switching" (EPRI report 1016830), which introduced a report format and form designed to allow utilities to submit reports of power switching-related incidents to a shared database. This new report summarizes work performed on the database in 2009.

2009-11-23T23:59:59.000Z

226

A survey SCADA of and critical infrastructure incidents  

Science Conference Proceedings (OSTI)

In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can ... Keywords: critical infrastructure, cyber attack, cyber security, information assurance and security, scada, security

Bill Miller; Dale Rowe

2012-10-01T23:59:59.000Z

227

Performance Management  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Performance Management. ... If you are unable to access these PDF files, please contact the Office of Workforce Management.

2013-04-20T23:59:59.000Z

228

NUCLEAR INCIDENT CAPABILITIES, KNOWLEDGE & ENABLER LEVERAGING  

Science Conference Proceedings (OSTI)

The detonation of a 10 Kiloton Improvised Nuclear Device (IND) is a serious scenario that the United States must be prepared to address. The likelihood of a single nuclear bomb exploding in a single city is greater today than at the height of the Cold War. Layered defenses against domestic nuclear terrorism indicate that our government continues to view the threat as credible. The risk of such an event is further evidenced by terrorists desire to acquire nuclear weapons. The act of nuclear terrorism, particularly an act directed against a large population center in the United States, will overwhelm the capabilities of many local and state governments to respond, and will seriously challenge existing federal response capabilities. A 10 Kiloton IND detonation would cause total infrastructure damage in a 3-mile radius and levels of radiation spanning out 3,000 square miles. In a densely populated urban area, the anticipated casualties would be in excess of several hundred thousand. Although there would be enormous loss of life, housing and infrastructure, an IND detonation is a recoverable event. We can reduce the risk of these high-consequence, nontraditional threats by enhancing our nuclear detection architecture and establishing well planned and rehearsed plans for coordinated response. It is also important for us to identify new and improved ways to foster collaboration regarding the response to the IND threat to ensure the demand and density of expertise required for such an event is postured and prepared to mobilize, integrate, and support a myriad of anticipated challenges. We must be prepared to manage the consequences of such an event in a deliberate manner and get beyond notions of total devastation by adopting planning assumptions around survivability and resiliency. Planning for such a scenario needs to be decisive in determining a response based on competencies and desired outcomes. It is time to synthesize known threats and plausible consequences into action. Much work needs to be accomplished to enhance nuclear preparedness and to substantially bolster and clarify the capacity to deploy competent resources. Until detailed plans are scripted, and personnel and other resources are postured, and exercised, IND specific planning remains an urgent need requiring attention and action. Although strategic guidance, policies, concepts of operations, roles, responsibilities, and plans governing the response and consequence management for the IND scenario exist, an ongoing integration challenge prevails regarding how best to get capable and competent surge capacity personnel (disaster reservists) and other resources engaged and readied in an up-front manner with pre-scripted assignments to augment the magnitude of anticipated demands of expertise. With the above in mind, Savannah River National Laboratory (SRNL) puts science to work to create and deploy practical, high-value, cost-effective nuclear solutions. As the Department of Energy's (DOE) applied research and development laboratory, SRNL supports Savannah River Site (SRS) operations, DOE, national initiatives, and other federal agencies, across the country and around the world. SRNL's parent at SRS also employs more than 8,000 personnel. The team is a great asset that seeks to continue their service in the interest of national security and stands ready to accomplish new missions. Overall, an integral part of the vision for SRNL's National and Homeland Security Directorate is the establishment of a National Security Center at SRNL, and development of state of the science capabilities (technologies and trained technical personnel) for responding to emergency events on local, regional, or national scales. This entails leveraging and posturing the skills, knowledge and experience base of SRS personnel to deliver an integrated capability to support local, state, and federal authorities through the development of pre-scripted requests for assistance, agreements, and plans. It also includes developing plans, training, exercises, recruitment strategies, and processes to e

Kinney, J.; Newman, J.; Goodwyn, A.; Dewes, J.

2011-04-18T23:59:59.000Z

229

Managing time  

Science Conference Proceedings (OSTI)

Professionals overwhelmed with information glut can find hope from new insights about time management.

Peter J. Denning

2011-03-01T23:59:59.000Z

230

Climate Influences on Meningitis Incidence in Northwest Nigeria  

Science Conference Proceedings (OSTI)

Northwest Nigeria is a region with high risk of meningitis. In this study, the influence of climate on monthly meningitis incidence was examined. Monthly counts of clinically diagnosed hospital-reported cases of meningitis were collected from ...

Auwal F. Abdussalam; Andrew J. Monaghan; Vanja M. Dukic; Mary H. Hayden; Thomas M. Hopson; Gregor C. Leckebusch; John E. Thornes

231

Estimation of Incident Photosynthetically Active Radiation from GOES Visible Imagery  

Science Conference Proceedings (OSTI)

Incident photosynthetically active radiation (PAR) is an important parameter for terrestrial ecosystem models. Because of its high temporal resolution, the Geostationary Operational Environmental Satellite (GOES) observations are very suited to ...

Tao Zheng; Shunlin Liang; Kaicun Wang

2008-03-01T23:59:59.000Z

232

Effect of Emergency Argon on FCF Operational Incidents  

SciTech Connect

The following report presents analyses of operational incidents which are considered in the safety analysis of the FCF argon cell and the effect that the operability of the emergency argon system has on the course of these incidents. The purpose of this study is to determine if the emergency argon system makes a significant difference in ameliorating the course of these incidents. Six incidents were considered. The following three incidents were analyzed. These are: 1. Cooling failing on 2. Vacuum Pump Failing on 3. Argon Supplies Failing on. In the remaining three incidents, the emergency argon supply would have no effect on the course of these transients since it would not come on during these incidents. The transients are 1. Loss of Cooling 2. Loss of power (Differs from above by startup delay till the Diesel Generators come on.) 3. Cell rupture due to an earthquake or other cause. The analyses of the first three incidents are reported on in the next three sections. This report is issued realizing the control parameters used may not be optimum, and additional modeling must be done to model the inertia of refrigeration system, but the major conclusion concerning the need for the emergency argon system is still valid. The timing of some events may change with a more accurate model but the differences between the transients with and without emergency argon will remain the same. Some of the parameters assumed in the analyses are Makeup argon supply, 18 cfm, initiates when pressure is = -6 iwg., shuts off when pressure is = -3.1 iwg. 170,000 ft3 supply. Min 1/7th always available, can be cross connected to HFEF argon supply dewar. Emergency argon supply, 900 cfm, initiates when pressure is = -8 iwg. shuts off when pressure is =-4 iwg. reservoir 220 ft3, refilled when tank farm pressure reduces to 1050 psi which is about 110 ft3.

Charles Solbrig

2011-12-01T23:59:59.000Z

233

Management Responsibilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Responsibilities Management Responsibilities Depleted UF6 Management Responsibilities DOE has responsibility for safe and efficient management of approximately 700,000 metric tons of depleted UF6. Organizational Responsibilities In the United States, the U.S. Department of Energy is responsible for managing all the depleted uranium that has been generated by the government and has been declared surplus to national defense needs. In addition, as a result of two memoranda of agreement that have been signed between the DOE and USEC, the DOE has assumed management responsibility for approximately 145,000 metric tons of depleted UF6 that has been or will be generated by USEC. Any additional depleted UF6 that USEC generates will be USEC's responsibility to manage. DOE Management Responsibility

234

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Guidance to someone by E-mail Share Federal Energy Management Program: Energy Management Guidance on Facebook Tweet about Federal Energy Management Program: Energy Management Guidance on Twitter Bookmark Federal Energy Management Program: Energy Management Guidance on Google Bookmark Federal Energy Management Program: Energy Management Guidance on Delicious Rank Federal Energy Management Program: Energy Management Guidance on Digg Find More places to share Federal Energy Management Program: Energy Management Guidance on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Energy Management Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal

235

Emergency Management Program, Brookhaven National Laboratory, BNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Management Homepage Emergency Management Mike Venegoni, Manager Brookhaven National Laboratory Bldg. 860 - P.O. Box 5000 Upton, NY 11973-5000 (631) 344-7280 E-mail: mvenegoni@bnl.gov Emergency Management Program Brookhaven National Laboratory :: Fire Danger Index - LOW The Fire Danger Index level takes into account current and antecedent weather, fuel types, and both live and dead fuel moisture. ▪ Index Description (pdf) ▪ NWS Fire Weather Forecast :: Important Information EMERGENCY Numbers Offsite: 631-344-2222 ▪ Emergency Services ▪ Hurricane Awareness :: Be Alert, Be Aware! Watch out for unattended bags/packages and report any unusual or suspicious incidents immediately to Police Headquarters by calling: 631-344-2222 The mission of the Emergency Management Program at Brookhaven National Laboratory is provide the framework for development, coordination, control, and direction of all emergency planning, preparedness, readiness assurance, response, and recovery actions.

236

US DOE/NNSA Response to 2011 Fukushima Incident- Data and Documentatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

US DOENNSA Response to 2011 Fukushima Incident- Data and Documentation US DOENNSA Response to 2011 Fukushima Incident- Data and Documentation NNSADataRepositoryGuide.pdf...

237

Federal Energy Management Program: Computerized Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Computerized Maintenance Management Systems to someone by E-mail Share Federal Energy Management Program: Computerized Maintenance Management Systems on Facebook Tweet about Federal Energy Management Program: Computerized Maintenance Management Systems on Twitter Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Google Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Delicious Rank Federal Energy Management Program: Computerized Maintenance Management Systems on Digg Find More places to share Federal Energy Management Program: Computerized Maintenance Management Systems on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

238

SSM/I Brightness Temperature Corrections for Incidence Angle Variations  

Science Conference Proceedings (OSTI)

The incidence angles of the SSM/I radiometers on the DMSP satellites vary from satellite to satellite and exhibit variations of up to 1.5 during one orbit. The effects of these variations on the measured brightness temperatures are investigated ...

Rolf Fuhrhop; Clemens Simmer

1996-02-01T23:59:59.000Z

239

Database of Incidents and Near Misses in Power Switching  

Science Conference Proceedings (OSTI)

This report presents the preliminary results of a research task sponsored by EPRI's Power Switching Safety and Reliability (PSS&R) project to develop a report format and form that will allow multiple utilities to submit reports of power switching-related incidents to a shared database.

2008-12-23T23:59:59.000Z

240

Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation and Quality Assurance for Data Sharing and Archival Now that you have planned your project and data management, collected data, integrated imagery, or generated model...

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

SUBCONTRACT MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-1 -1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish, document, and maintain adequate purchasing systems. 2. To ensure contractors flow down contract requirements to subcontractors. WHY IS SUBCONTRACT MANAGEMENT IMPORTANT? In many Department prime contracts a significant portion of the obligated dollars is spent on subcontract work. Due to the absence of a direct contractual relationship with the subcontractor, the Department must rely on the prime contractor to manage subcontract work. Subcontractors perform significant work efforts at sites and are an integral part of the site's success. Prime

242

Reservation Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Reservation Management The ORR is home to three major facility complexes: the East Tennessee Technology Park (ETTP), the National Nuclear Security Administration's (NNSA's) Y-12...

243

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

to global waste vitrification and related programs Serve as a technical platform for DOE reviews Environmental Management Leadership Team Responsible for identifying or...

244

Management Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Plan (SSMP) to be submitted to Congress after the April 2010 release of the Nuclear Posture Review Report. It is aligned with the President's National Security Strategy...

245

The Medical Aspects of Radiation Incidents, 3rd Edition  

NLE Websites -- All DOE Office Websites (Extended Search)

Revised - 092513 Page 1 The Radiation Emergency Assistance CenterTraining Site (REACTS) has provided the Department of Energy with expertise related to the medical management...

246

Cancer incidence in atomic bomb survivors. Part I: Use of the tumor registries in Hiroshima and Nagasaki for incidence studies  

SciTech Connect

More than 30 years ago, population-based tumor registries were established in Hiroshima and Nagasaki. This report, the first of a series of papers on cancer incidence, describes methodological aspects of the tumor registries and discusses issues of data quality in the context of the Life Span Study (LSS) cohort, the major atomic bomb survivor population. The tumor registries in Hiroshima and Nagasaki are characterized by active case ascertainment based on abstraction of medical records at area hospitals, augmented by tissue registries operational in the area and a number of clinical and pathological programs undertaken over the years among the atomic bomb survivors. Using conventional measures of quality, the Hiroshima and Nagasaki tumor registries have a death certificate-only (DCO) rate of less than 9%, a mortality/incidence (M/I) ratio of about 50%, and a histological verification (HV) rate in excess of 70%, which place these registries among the best in Japan and comparable to many established registries worldwide. All tumor registry data pertaining to the LSS population were assembled, reviewed and handled with special attention given to the quality and uniformity of data based on standardized procedures. Special studies and monitoring programs were also introduced to evaluate the quality of the tumor incidence data in the LSS. Analyses were performed to examine the quality of incidence data overall and across various substrata used for risk assessment such as age, time and radiation dose groups. No significant associations were found between radiation dose and data quality as measured by various indices. These findings warrant the use of the present tumor registry-based data for studies of cancer incidence in the atomic bomb survivors. 41 refs., 2 figs., 10 tabs.

Mabuchi, Kiyohiko; Tokunaga, Masayoshi; Preston, D.L. (Radiation Effects Research Foundation, Hiroshima (Japan)); Soda, Midori (Radiation Effects Research Foundation, Nagasaki (Japan)); Ron, E. (Radiation Effects Research Foundation, Hiroshima (Japan) National Cancer Institute, Bethesda, MD (United States)); Ochikubo, Sumio (Hiroshima Perfectural Medical Association (Japan)); Ikeda, Takayoshi (Nagasaki Univ. School of Medicine (Japan)); Terasaki, Masayuki (Nagasaki City Medical Association (Japan)); Thompson, D.E. (Radiation Effects Research Foundation, Nagasaki (Japan) Radiation Effects Research Foundation, Hiroshima (Japan) George Washington Univ., Rockville, MD (United States))

1994-02-01T23:59:59.000Z

247

DEACTIVATION MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the Overall End-State  Viewing Deactivation in Two Phases  Early Decisions  Early Deactivation Tasks  Facility-Specific Commitments  Hazard Reduction  Detailed End-Points  Set Up Method and Criteria  Post-Deactivation S&M Plan

248

Safety & Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Coordination Management andor Coordination of APS Site WorkServices Safety & Emergency Management Database Maintenance Personnel Safety & Emergency Management Area...

249

Environmental Management Waste Management Facility (EMWMF) at...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Skip to main content Energy.gov Office of Environmental Management Search form Search Office of Environmental Management Services Waste Management Site & Facility Restoration...

250

Organization Update Assistant Manager for Environmental Management  

NLE Websites -- All DOE Office Websites (Extended Search)

EM-90 Office of the Manager Mark Whitney, Manager Sue Cange, Deputy Manager Brenda Hawks, Senior Technical Advisor Karen Ott, Chief of Staff Karen Forester, Administrative...

251

Federal Energy Management Program: Federal Energy Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Energy Management Program Contacts to someone by E-mail Share Federal Energy Management Program: Federal Energy Management Program Contacts on Facebook Tweet about Federal...

252

Federal Energy Management Program: Energy Management Requirements...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Requirements by Subject to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Subject on Facebook Tweet about Federal...

253

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water-Efficient Irrigation on Facebook Tweet about Federal Energy Management Program: Best...

254

Federal Energy Management Program: Computerized Maintenance Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Maintenance Management Systems Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and...

255

Training Management Information System  

Science Conference Proceedings (OSTI)

The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

Rackley, M.P.

1989-01-01T23:59:59.000Z

256

Boundary conditions for NLTE polarized radiative transfer with incident radiation  

E-Print Network (OSTI)

Polarized NLTE radiative transfer in the presence of scattering in spectral lines and/or in continua may be cast in a so-called reduced form for six reduced components of the radiation field. In this formalism the six components of the reduced source function are angle-independent quantities. It thus reduces drastically the storage requirement of numerical codes. This approach encounters a fundamental problem when the medium is illuminated by a polarized incident radiation, because there is a priori no way of relating the known (and measurable) Stokes parameters of the incident radiation to boundary conditions for the reduced equations. The origin of this problem is that there is no unique way of deriving the radiation reduced components from its Stokes parameters (only the inverse operation is clearly defined). The method proposed here aims at enabling to work with arbitrary incident radiation field (polarized or unpolarized). In previous works an ad-hoc treatment of the boundary conditions, applying to case...

Faurobert, Marianne; Atanackovic, Olga

2013-01-01T23:59:59.000Z

257

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Immobilization Research Immobilization Research Kurt Gerdes U.S. DOE, Office of Engineering and Technology John Vienna Pacific Northwest National Laboratory Environmental Management May 19, 2009 2009 Hanford - Idaho - Savannah River Technical Exchange 2 Objectives Perform research and development to advance the waste stabilization technology options by through closely- coupled theory, experimentation, and modeling Develop solutions for Hanford, Idaho, Savannah River, and Oak Ridge wastes challenges (along with facilitating management of future wastes) Environmental Management General Approach Balance between near-term incremental technology improvements and long-term transformational solutions Address the requirements for high risk waste streams - high-level tank waste (RPP, SRS)

258

Work Manager  

Science Conference Proceedings (OSTI)

A real-time control system has been developed and deployed nationally to support BTs work management programme. This paper traces the history, system architecture, development, deployment and service aspects of this very large programme. Many ...

G. J. Garwood

1997-01-01T23:59:59.000Z

259

Management Solution  

E-Print Network (OSTI)

MEMO: Request for proposal for Computer-Aided Facilities and Maintenance Management application software; professional services; development services for interfaces to Financial Management and Human Resources systems; configuration, test, train, maintenance and support services to implement and maintain a CAFM Solution for the California Administrative Office of the Courts, the Trial Courts, the Appellate Courts and the Judicial Council, known as The AOC Group. You are invited to review and respond to the attached Request for Proposal (RFP):

Rfp Number Isdcafm

2004-01-01T23:59:59.000Z

260

Airflow Management  

Science Conference Proceedings (OSTI)

This technical update provides an overview of airflow management, with an emphasis on how reduced airflow can improve energy efficiency in data centers. Airflow management within a data center can have a dramatic impact on energy efficiency. Typically, much more cold air circulates within conventional data centers than is actually needed to cool equipment related to information and communication technology (ICT). It is not uncommon for facilities to supply more than two to three times the minimum require...

2011-12-14T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A SUMMARY OF INCIDENTS INVOLVING USAEC SHIPMENTS OF RADIOACTIVE MATERIAL, 1957-1961  

SciTech Connect

Data are summarized on incidents that have been sustained by the AEC in the transport of radioactive materials from 1957 through 1981. In the period covered by this report there were 47 incidents reported. Twenty-nine did not result in the release of radioactive materials. Of the remaining 18 cases there was none that involved any serious radiological consequences or involved costly cleanup. Six of the incidents involved onsite movements of materials. The incidents are classified in accordance with the type of radiation release that occurred, mode of transport, and type of incident. Photographs are included for a number of the incidents. (C.H.)

Patterson, D.E.; DeFatta, V.P.

1963-10-31T23:59:59.000Z

262

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Video Community, Environment Environmental Stewardship Environmental Protection Environmental Management System Environmental Management System An Environmental...

263

Quality System Documentation Management  

Science Conference Proceedings (OSTI)

Quality System Documentation Management. ... Minutes, summaries, or notes from Management Meetings of significance are archived here. ...

2012-08-21T23:59:59.000Z

264

NIST Performance Management Program  

Science Conference Proceedings (OSTI)

NIST Performance Management Program. Performance ... appraisal. APMS and FWS Performance Management Programs: ...

2010-10-05T23:59:59.000Z

265

Presidential Management Fellows Program  

Science Conference Proceedings (OSTI)

Presidential Management Fellows Program. Summary: About the Program: The Presidential Management Fellows (PMF ...

2012-08-31T23:59:59.000Z

266

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

267

MANAGEMENT SUMMARY  

E-Print Network (OSTI)

need to effectively manage business performance. This has never been more true than in todays complex, highly regulated and confusing business environment which requires better decisions and improved execution now! In spite of the billions of dollars invested in infor-mation technology to address these challenges, managers and executives in many organizations still make key decisions underpinned by their own personal versions of documents and spread-sheets. Their organization struggles to provide a seamless flow of trusted information between customers, suppliers and their employees. The result is that most organizations cannot provide their people with the right information at the right time, and in attempting to do so are committing significant resources to compiling and auditing numbers instead of using them to inform the business. Consequently, they are far more reac-tive than proactive and ultimately they are not efficiently and effectively managing their current and future performance. Leading organizations are investing in managing information and developing predictive insights to drive sustainable business results. These com-panies have become masters in Performance Management- going beyond mere users of business intelligence to become the Intelligent Enterprises. ...a new breed of company is upping the stakes....have dominated their fields by deploy-ing industrial-strength analytics across a wide variety of activities. In essence, they are trans-forming their organiza-tions into armies of killer apps and crunching their way to victory.

unknown authors

2006-01-01T23:59:59.000Z

268

Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters  

SciTech Connect

The University of Nevada, Reno Fire Science Academy (FSA) applied for grant funding to develop and deliver programs for municipal, rural, and volunteer firefighters. The FSA specializes in preparing responders for a variety of emergency events, including flammable liquid fires resulting from accidents, intentional acts, or natural disasters. Live fire training on full scale burnable props is the hallmark of FSA training, allowing responders to practice critical skills in a realistic, yet safe environment. Unfortunately, flammable liquid live fire training is often not accessible to municipal, rural, or volunteer firefighters due to limited department training budgets, even though most department personnel will be exposed to flammable liquid fire incidents during the course of their careers. In response to this training need, the FSA developed a course during the first year of the grant (Year One), Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters. During the three years of the grant, a total of 2,029 emergency responders received this training. In Year Three, two new courses, a train-the-trainer for Responding to Terrorist Incidents in Your Community and Management of Large-Scale Disasters for Public Officials were developed and pilot tested during the Real-World Disaster Management Conference held at the FSA in June of 2007. Two research projects were conducted during Years Two and Three. The first, conducted over a two year period, evaluated student surveys regarding the value of the flammable liquids training received. The second was a needs assessment conducted for rural Nevada. Both projects provided important feedback and a basis for curricula development and improvements.

Denise Baclawski

2010-03-08T23:59:59.000Z

269

Feature: Washing Your Laundry in Public - An Analysis of Recent High-Publicity Security Incidents  

Science Conference Proceedings (OSTI)

There is, reportedly, a significant rise in the frequency of information security incidents. Quite obviously, there is a very significant rise in the public reporting of such incidents. Whereas all of us are more or less experienced in protecting our ...

Matthew Pemble

2000-12-01T23:59:59.000Z

270

ORISE: DeepwaterHorizon and Nuclear & Radiological Incidents  

NLE Websites -- All DOE Office Websites (Extended Search)

Wi l l i a m H a l e y Wi l l i a m H a l e y B r a d P o t t e r C o mm o n C h a l l e n g e s a n d S o l u t i o n s J u n e 2 0 1 1 D e e p w a t e r H o r i z o n a n dN u c l e a r & R a d i o l o g i c a l I n c i d e n t s The 2010 Deepwater Horizon oil spill shares many of the same challenges associated with a radiological incident like the one considered in the Empire 09 1 exercise or even a much larger nuclear incident. By analyzing experiences during Deepwater Horizon, these challenges can be identified by the interagency in advance of a radiological or nuclear emergency and solutions made available. Establishing and staffing a UnifiEd Command strUCtUrE The demands of Deepwater Horizon challenged the traditional response construct envisioned by national planning systems.

271

Challenges for Early Responders to a Nuclear / Radiological Terrorism Incident  

Science Conference Proceedings (OSTI)

Even in the best of circumstances, most municipalities would face severe challenges in providing effective incident response to a large scale radiation release caused by nuclear terrorism or accident. Compounding obvious complexities, the effectiveness of first and early responders to a radiological emergency may also be hampered by an insufficient distribution of radiation detection and monitoring equipment, local policies concerning triage and field decontamination of critical victims, malfunctioning communications, inadequate inter-agency agility, and the psychological 'fear' impact on early responders. This paper examines several issues impeding the early response to nuclear terrorism incidents with specific consideration given to the on-going and forward-thinking preparedness efforts currently being developed in the Sacramento, California region. Specific recommendations are provided addressing hot zone protocols, radiation detection and monitoring equipment, hasty patient packaging techniques, vertically and horizontally integrated pre-event training, mitigating psychological fear, and protocols for the effective 'hand-off' from first responders to subsequent early response-recovery teams. (authors)

Wells, M.A. [Sacramento Metropolitan Fire District, Sacramento, CA (United States); Stearns, L.J. [Shaw Environmental, Inc, Monroeville, PA (United States); Davie, A.D. [Shaw Environmental, Inc, Alpharetta, GA (United States); Day, E. [PELL Resources Company, Manassas, VA (United States)

2007-07-01T23:59:59.000Z

272

A SUMMARY OF INCIDENTS INVOLVING RADIOACTIVE MATERIAL IN ATOMIC ENERGY ACTIVITIES, JANUARY-DECEMBER 1956  

SciTech Connect

Pertinert details of the incidents are given. Some are illustrated with photographs or diagrams. (M.H.R.)

Hayes, D.F.

1957-08-01T23:59:59.000Z

273

Operational Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Operational Management Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom of...

274

Aviation Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Aviation Management Aviation Management Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management Freedom...

275

Keeping the patient asleep and alive: Towards a computational cognitive model of disturbance management in anaesthesia  

Science Conference Proceedings (OSTI)

We have analysed rich, dynamic data about the behaviour of anaesthetists during the management of a simulated critical incident in the operating theatre. We use a paper based analysis and a partial implementation to further the development of a computational ... Keywords: Behavioural analysis, Computational cognitive modelling, Disturbance management

K. Keogh; E. A. Sonenberg

2007-12-01T23:59:59.000Z

276

Categorical Exclusion Determinations: Environmental Management...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Categorical Exclusion Determinations: Environmental Management Categorical Exclusion Determinations issued by Environmental Management. DOCUMENTS AVAILABLE...

277

Catastrophic Incident Recovery: Long-Term Recovery from an  

E-Print Network (OSTI)

like to acknowledge and thank the regional emergency managers, pubic health and medical services- tial economic implications, the possible impacts on public health and medical services, and the deci those of the United States Government or any agency thereof. PACIFIC NORTHWEST NATIONAL LABORATORY

278

ORISE: Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

279

Asymmetric-cut variable-incident-angle monochromator  

Science Conference Proceedings (OSTI)

A novel asymmetric-cut variable-incident-angle monochromator was constructed and tested in 1997 at the Advanced Photon Source of Argonne National Laboratory. The monochromator was originally designed as a high heat load monochromator capable of handling 5-10 kW beams from a wiggler source. This was accomplished by spreading the x-ray beam out on the surface an asymmetric-cut crystal and by using liquid metal cooling of the first crystal. The monochromator turned out to be a highly versatile monochromator that could perform many different types of experiments. The monochromator consisted of two 18 deg. asymmetrically cut Si crystals that could be rotated about 3 independent axes. The first stage ({Phi}) rotates the crystal around an axis perpendicular to the diffraction plane. This rotation changes the angle of the incident beam with the surface of the crystal without changing the Bragg angle. The second rotation ({Psi}) is perpendicular to the first and is used to control the shape of the beam footprint on the crystal. The third rotation ({Theta}) controls the Bragg angle. Besides the high heat load application, the use of asymmetrically cut crystals allows one to increase or decrease the acceptance angle for crystal diffraction of a monochromatic x-ray beam and allows one to increase or decrease the wavelength bandwidth of the diffraction of a continuum source like a bending-magnet beam or a normal x-ray-tube source. When the monochromator is used in the doubly expanding mode, it is possible to expand the vertical size of the double-diffracted beam by a factor of 10-15. When this was combined with a bending magnet source, it was possible to generate an 8 keV area beam, 16 mm wide by 26 mm high with a uniform intensity and parallel to 1.2 arc sec that could be applied in imaging experiments.

Smither, R. K.; Fernandez, P. B.; Mills, D. M. [Advanced Photon Source, Argonne National Laboratory, Argonne, Illinois 60439 (United States); Graber, T. J. [Center for Advanced Radiation Sources, University of Chicago, Chicago, Illinois 60637 (United States)

2012-03-15T23:59:59.000Z

280

Federal Energy Management Program: Best Management Practice: Cooling Tower  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooling Tower Management to someone by E-mail Cooling Tower Management to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Google Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Delicious Rank Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Federal Energy Management Program: Best Management Practice: Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Management Planning to someone by E-mail Water Management Planning to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water Management Planning on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Water Management Planning on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Google Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Delicious Rank Federal Energy Management Program: Best Management Practice: Water Management Planning on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Water Management Planning on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

282

MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT  

E-Print Network (OSTI)

#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines

283

Summary - Environmental Management Waste Management Facility...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ETR Report Date: February 2008 ETR-11 United States Department of Energy Office of Environmental Management (DOE-EM) External Technical Review of Environmental Management...

284

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Faucets and Showerheads to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Faucets and Showerheads on Facebook Tweet about Federal Energy...

285

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Other Water Intensive Processes to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Other Water Intensive Processes on Facebook Tweet about...

286

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Water-Efficient Landscaping to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water-Efficient Landscaping on Facebook Tweet about Federal...

287

DUF6 Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Depleted UF6 Management An introduction to DOE's Depleted UF6 Management Program. The mission of the DOE's Depleted UF6 Management Program is to safely and efficiently...

288

Your Records Management Responsibilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Your Records Management Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your job. This pamphlet explains your responsibilities for federal records and provides the context for understanding records management in the federal government and in the Department of Energy. TOP RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT

289

Integrated Safety Management Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTEGRATED SAFETY INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS ACRONYMS................................................................................................................................................................v EXECUTIVE SUMMARY .........................................................................................................................................1

290

Managing time, part 2  

Science Conference Proceedings (OSTI)

Masterful time management means not just tracking of messages in your personal environment, but managing your coordination network with others.

Peter J. Denning; Ritu Raj

2011-09-01T23:59:59.000Z

291

Environmental Management Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Management Systems Technical Assistance Tools Technical Assistance Tool: Integrating Sustainable Practices into Environmental Management Systems , November 2009...

292

Federal Response Assets for a Radioactive Dispersal Device Incident  

SciTech Connect

If a large scale RDD event where to occur in New York City, the magnitude of the problem would likely exceed the capabilities of City and State to effectively respond to the event. New York State could request Federal Assistance if the United States President has not already made the decision to provide it. The United States Federal Government has a well developed protocol to respond to emergencies. The National Response Framework (NRF) describes the process for responding to all types of emergencies including RDD incidents. Depending on the location and type of event, the NRF involves appropriate Federal Agencies, e.g., Department of Homeland Security (DHS), the Department of Energy (DOE), Environmental Protection Agency (EPA), United States Coast Guard (USCG), Department of Defense (DOD), Department of Justice (DOJ), Department of Agriculture (USDA), and Nuclear Regulatory Commission (NRC). The Federal response to emergencies has been refined and improved over the last thirty years and has been tested on natural disasters (e.g. hurricanes and floods), man-made disasters (oil spills), and terrorist events (9/11). However, the system has never been tested under an actual RDD event. Drills have been conducted with Federal, State, and local agencies to examine the initial (early) phases of such an event (TopOff 2 and TopOff 4). The Planning Guidance for Protection and Recovery Following Radiological Dispersal Device (RDD) and Improvised Nuclear Device (IND) incidents issued by the Department of Homeland Security (DHS) in August 2008 has never been fully tested in an interagency exercise. Recently, another exercise called Empire 09 that was situated in Albany, New York was conducted. Empire 09 consists of 3 different exercises be held in May and June, 2009. The first exercise, May 2009, involved a table top exercise for phase 1 (0-48 hours) of the response to an RDD incident. In early June, a full-scale 3- day exercise was conducted for the mid-phase response (48 hours +). A few weeks later, a one day full-scale exercise was conducted for the late phase (recovery) response to an RDD event. The lessons learned from this study are not available as of June 30, 2009. The objective of this report is to review and summarize anticipated Federal and State response actions and the roles and responsibilities of various agencies (DHS, EPA, DOE, NY-DEP, NY-DEC) with respect to decontamination issues that would arise from a radiological dispersion device (RDD), e.g., dirty bomb attack. These issues arise in the late phase of the response (48 hours and beyond) after the area has been stabilized and forensic information has been obtained. Much of the information provided in this report is taken directly from published guidance that is readily available.

Sullivan,T.

2009-06-30T23:59:59.000Z

293

OIA: Office of Contract Assurance: Assurance Systems: Issues Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Issues Management Program Issues Management Program Overview The Lawrence Berkeley National Laboratory (LBNL) Issues Management Program encompasses issue identification, causal analysis, corrective action development, tracking and implementation, and corrective action verification of completion and validation of effectiveness. The program also includes monitoring and analysis of adverse trends and conditions, and sharing of lessons learned and best practices. The issues that are relevant to this program pertain to any safety or operational event, condition, or circumstance that: results or could result in injury, damage, loss, or noncompliance (Example: actual or near miss incidents); represents a program, safety or operational deficiency (Example: audit or assessment finding, performance weakness); or

294

Managing PCBs  

Science Conference Proceedings (OSTI)

Compliance with Environmental Protection Agency regulations for managing the polychlorinated biphenyls (PCBs) that were widely distributed in electrical equipment will be costly to the utility industry, estimated at over $5 billion over a ten-year period by the Electric Power Research Institute (EPRI). Most of the budget could be needed to identify and reclaim 2.5 million contaminated transformers. Three divisions are coordinating EPRI research efforts with those of other companies and utilities in the areas of detection, destruction, spill cleanup, disposal, and health effects. (DCK)

Lihach, N.

1981-10-01T23:59:59.000Z

295

THE ENVIRONMENTAL DEPENDENCE OF THE INCIDENCE OF GALACTIC TIDAL FEATURES  

Science Conference Proceedings (OSTI)

In a sample of 54 galaxy clusters (0.04 < z < 0.15) containing 3551 early-type galaxies suitable for study, we identify those with tidal features both interactively and automatically. We find that {approx}3% have tidal features that can be detected with data that reach a 3{sigma} sensitivity limit of 26.5 mag arcsec{sup -2}. Regardless of the method used to classify tidal features, or the fidelity imposed on such classifications, we find a deficit of tidally disturbed galaxies with decreasing clustercentric radius that is most pronounced inside of {approx}0.5 R{sub 200}. We cannot distinguish whether the trend arises from an increasing likelihood of recent mergers with increasing clustercentric radius or a decrease in the lifetime of tidal features with decreasing clustercentric radius. We find no evidence for a relationship between local density and the incidence of tidal features, but our local density measure has large uncertainties. We find interesting behavior in the rate of tidal features among cluster early-types as a function of clustercentric radius and expect such results to provide constraints on the effect of the cluster environment on the structure of galaxy halos, the build-up of the red sequence of galaxies, and the origin of the intracluster stellar population.

Adams, Scott M.; Zaritsky, Dennis [Steward Observatory, University of Arizona, Tucson, AZ 85721 (United States); Sand, David J.; Graham, Melissa L. [Las Cumbres Observatory Global Telescope Network, 6740 Cortona Dr., Suite 102, Santa Barbara, CA 93117 (United States); Bildfell, Chris; Pritchet, Chris [Department of Physics and Astronomy, University of Victoria, P.O. Box 3055, STN CSC, Victoria, BC V8W 3P6 (Canada); Hoekstra, Henk [Leiden Observatory, Leiden University, Niels Bohrweg 2, NL-2333 CA Leiden (Netherlands)

2012-11-01T23:59:59.000Z

296

Development of metrology instruments for grazing incidence mirrors  

Science Conference Proceedings (OSTI)

The effective utilization of synchrotron radiation (SR) from high-brightness sources requires the use of optical components with very smooth surfaces and extremely precise shapes. Most manufacturers are not capable of measuring the figure and finish quality of the aspheric optics required for use in grazing incidence beam lines. Over the past several years we have developed measurement techniques and metrology instrumentation that have allowed us to measure the surface profile and roughness of large cylinder optics, up to one meter in length. Based on our measurements and feedback, manufacturers have been able to advance the state-of-the-art in mirror fabrication and are now able to produce acceptable components. Our analysis techniques enable designers to write meaningful specifications and predict the performance of real surfaces in their particular beamline configurations. Commercial instruments are now available for measuring surface microroughness with spatial periods smaller than about one millimeter. No commercial instruments are available for measuring the surface figure on cylindrical aspheres over long spatial periods, from one millimeter up to one meter. For that reason we developed a Long Trace Profiler (LTP) that measures surface profile over the long period range in a non-contact manner to extremely high accuracy. Examples of measured surfaces and data analysis techniques will be discussed, and limitations on the quality of optical surfaces related to intrinsic material properties will also be discussed. 15 refs., 14 figs., 2 tabs.

Takacs, P.Z. (Brookhaven National Lab., Upton, NY (USA)); Church, E.L. (Army Research and Development Command, Dover, NJ (USA)); Qian, Shi-nan (China Univ. of Science and Technology, Hefei, AH (China). Hefei National Synchrotron Radiation Lab.); Liu, Wuming (Academia Sinica, Beijing, BJ (China). Inst. of High Energy Physics)

1989-10-01T23:59:59.000Z

297

Priest Rapids Dam flow curtailment: Incident report, January 7, 1961  

SciTech Connect

This incident report deals with mechanical damage (caused by falling rocks) to the power line supplying station power, Priest Rapids Dam lost all generating flow at 4:23 p.m., cutting discharge from 71,700 cfs to about 12,000 cfs. Within five minutes, spillway gates were opened, bringing river flow back to greater than 36,000 cfs in about 10 minutes. The flow at 181-B dropped from 72,000 cfs to a minimum of 56,000 cfs at about 5:25 p.m. Priest Rapids generators returned to service at 4:45 p.m., the indicated flow at the gauge reaching 71,700 cfs again at about 8:00 p.m. River temperatures at the gauge increased 0.5 C following the interruption, but not at 181-B. Prompt HAPO notification of the flow reduction as provided for in the agreement between the PUD and the AEC was not made on this occasion; the first notice came from the 251 Substation.

Kramer, H.A.; Corley, J.P.

1961-01-20T23:59:59.000Z

298

ISSUES MANAGEMENT PROGRAM MANUAL  

E-Print Network (OSTI)

NTS-REPORTABLE INCIDENTS, ORPS CATEGORY 1 OR 2 REPORTABLEand Processing System (ORPS) reports, Accident Investigationto, requirements to perform an ORPS RCA. Performance of this

Gravois, Melanie

2007-01-01T23:59:59.000Z

299

M E Environmental Management Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

safety  performance  cleanup  closure safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D Program 2013 Edition U.S. Department Of Energy safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management 3/13/2013 The American Recovery and Reinvestment Act of 2009

300

Plasma particle and energy reflection at a wall with an obliquely incident magnetic field  

SciTech Connect

The particle and energy reflection coefficients are calculated for a plasma incident at a wall with an obliquely incident magnetic field. The salient result of these calculations is that the reflection coefficients can approach unity when the magnetic field is incident at grazing angles. This reflection of particles and energy will be an important process in determining the particle and energy balance in the edge plasma.

Knize, R.J.

1985-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Potential safety-related incidents with possible applicability to a nuclear fuel reprocessing plant  

SciTech Connect

The occurrence of certain potential events in nuclear fuel reprocessing plants could lead to significant consequences involving risk to operating personnel or to the general public. This document is a compilation of such potential initiating events in nuclear fuel reprocessing plants. Possible general incidents and incidents specific to key operations in fuel reprocessing are considered, including possible causes, consequences, and safety features designed to prevent, detect, or mitigate such incidents.

Perkins, W.C.; Durant, W.S.; Dexter, A.H.

1980-12-01T23:59:59.000Z

302

Incident detection using the Standard Normal Deviate model and travel time information from probe vehicles  

E-Print Network (OSTI)

One application of travel time information explored in this thesis is freeway incident detection. It is vital to develop reliable methods for automatically detecting incidents to facilitate the quick response and removal of incidents before they cause breakdowns in traffic flow. The use of real-time travel time data to monitor freeway conditions has the advantages over conventional loop detectors of taking into account the dynamic, longitudinal nature of traffic flow and requiring data from only a portion of the traffic stream. This study employed the Standard Normal Deviate (SND) Model to test the feasibility of using travel time data to detect lane blocking incidents. The fundamental concept of the SND Model was based on the comparison of real-time travel time data to historical travel time data for given freeway segments during specified times. The travel time and incident reports used were collected through the Real-Time Traffic Information System (RTTIS) in the north freeway corridor of Houston, Texas using probe vehicles equipped with cellular telephones. The data were compiled on 39 freeway links from October 1991 through August 1992 on weekdays during morning and afternoon data collection periods. The results of incident detection tests, applying the SND Model to incident and travel time me data from the North Freeway, indicated high successful incident detection rates. However, high false alarm rates also resulted from the SND Model test applications. An optimum SND value of 2.0 was observed for the North Freeway test data. At this value the SND tests produced successful incident detection rates of 70 percent and higher during both the morning and afternoon periods. False alarm rates were also 70 percent. The best results were achieved on those freeway sections where the most incident and travel time data had been collected. The overall results of the incident detection tests on the North Freeway demonstrated that the SND Model was a feasible incident detection algorithm, but required an extensive historical travel time data base.

Mountain, Christopher Eugene

1993-01-01T23:59:59.000Z

303

Enhanced Chemical Incident Response Plan (ECIRP). Appendix F, remediation analysis with Decision Support Tools (DSTs) for wide-area chemical hazards.  

SciTech Connect

The Defense Threat Reduction Agency (DTRA) commissioned an assessment of the Consequence Management (CM) plans in place on military bases for response to a chemical attack. The effectiveness of the CM plans for recovering from chemical incidents was modeled using a multiple Decision Support Tools (DSTs). First, a scenario was developed based on an aerial dispersion of a chemical agent over a wide-area of land. The extent of contamination was modeled with the Hazard Prediction and Assessment Capability (HPAC) tool. Subsequently, the Analyzer for Wide Area Restoration Effectiveness (AWARE) tool was used to estimate the cost and time demands for remediation based on input of contamination maps, sampling and decontamination resources, strategies, rates and costs. The sampling strategies incorporated in the calculation were designed using the Visual Sample Plan (VSP) tool. Based on a gaps assessment and the DST remediation analysis, an Enhanced Chemical Incident Response Plan (ECIRP) was developed.

Hassig, Nancy L. (Pacific Northwest National Laboratory, Richland, WA); Pulsipher, Brent A. (Pacific Northwest National Laboratory, Richland, WA); Foltz, Greg W.; Hoette, Trisha Marie

2011-07-01T23:59:59.000Z

304

NIST SP 800-83, Guide to Malware Incident Prevention and ...  

Science Conference Proceedings (OSTI)

Page 1. Special Publication 800-83 Sponsored by the Department of Homeland Security Guide to Malware Incident Prevention and Handling ...

2012-02-09T23:59:59.000Z

305

Coccidioidomycosis Incidence in Arizona Predicted by Seasonal Precipitation  

E-Print Network (OSTI)

The environmental mechanisms that determine the inter-annual and seasonal variability in incidence of coccidioidomycosis are unclear. In this study, we use Arizona coccidioidomycosis case data for 19952006 to generate a timeseries of monthly estimates of exposure rates in Maricopa County, AZ and Pima County, AZ. We reveal a seasonal autocorrelation structure for exposure rates in both Maricopa County and Pima County which indicates that exposure rates are strongly related from the fall to the spring. An abrupt end to this autocorrelation relationship occurs near the the onset of the summer precipitation season and increasing exposure rates related to the subsequent season. The identification of the autocorrelation structure enabled us to construct a primary exposure season that spans August-March and a secondary season that spans April June which are then used in subsequent analyses. We show that OctoberDecember precipitation is positively associated with rates of exposure for the primary exposure season in both Maricopa County (R = 0.72, p = 0.012) and Pima County (R = 0.69, p = 0.019). In addition, exposure rates during the primary exposure seasons are negatively associated with concurrent precipitation in Maricopa (R = 20.79, p = 0.004) and Pima (R = 20.64, p = 0.019), possibly due to reduced spore dispersion. These associations enabled the generation of models to estimate exposure rates for the primary exposure season. The models explain 69 % (p = 0.009) and 54 % (p = 0.045) of the variance in the study period for Maricopa and Pima counties, respectively. We did not find any significant predictors for exposure rates during the secondary season. This study

James D. Tamerius; Andrew C. Comrie

2011-01-01T23:59:59.000Z

306

On the Incidence and Kinematics of Strong Mg II Absorbers  

E-Print Network (OSTI)

We present the results of two investigations into the nature of strong (rest equivalent width > 1.0 Ang) Mg II absorption systems at high redshift. The first line of questioning examines the complete SDSS- DR3 set of quasar spectra to determine the evolution of the incidence of strong Mg II absorption. The redshift evolution of the comoving line-of-sight number density, l(x), is characterized by a roughly constant value at z > 0.8, indicating that the product of the number density and gas cross-section of halos hosting strong Mg II is unevolving at these redshifts. At z gas cross-section to strong Mg II absorption and therefore a decline in the physical processes relevant to such absorption. This evolution roughly tracks the global evolution of the SFR density. The decrease of l(x) is more pronounced for larger equivalent width systems. We also present the results of a search for strong Mg II absorption in 91 high resolution quasar spectra, which allow us to investigate the kinematics of such systems. These systems are characterized by the presence of numerous components spread over a ~200 km/s velocity width and the presence of more highly ionized species, which display kinematic profiles similar to the corresponding Mg II absorption. We consider these results in light of two competing theories to explain strong Mg II absorption: post-starburst, SN-driven galactic winds and accreting gas in the halos of massive galaxies. The later model is disfavored by the absence of evolution in l(x) at z > 1. We argue that the strong Mg II phenomenon primarily arises from feedback processes in relatively low mass galactic halos related to star formation.

Gabriel E. Prochter; Jason X. Prochaska; Scott Burles

2004-11-29T23:59:59.000Z

307

Residential radon and lung cancer incidence in a Danish cohort  

SciTech Connect

High-level occupational radon exposure is an established risk factor for lung cancer. We assessed the long-term association between residential radon and lung cancer risk using a prospective Danish cohort using 57,053 persons recruited during 1993-1997. We followed each cohort member for cancer occurrence until 27 June 2006, identifying 589 lung cancer cases. We traced residential addresses from 1 January 1971 until 27 June 2006 and calculated radon at each of these addresses using information from central databases regarding geology and house construction. Cox proportional hazards models were used to estimate incidence rate ratios (IRR) and 95% confidence intervals (CI) for lung cancer risk associated with residential radon exposure with and without adjustment for sex, smoking variables, education, socio-economic status, occupation, body mass index, air pollution and consumption of fruit and alcohol. Potential effect modification by sex, traffic-related air pollution and environmental tobacco smoke was assessed. Median estimated radon was 35.8 Bq/m{sup 3}. The adjusted IRR for lung cancer was 1.04 (95% CI: 0.69-1.56) in association with a 100 Bq/m{sup 3} higher radon concentration and 1.67 (95% CI: 0.69-4.04) among non-smokers. We found no evidence of effect modification. We find a positive association between radon and lung cancer risk consistent with previous studies but the role of chance cannot be excluded as these associations were not statistically significant. Our results provide valuable information at the low-level radon dose range.

Braeuner, Elvira V., E-mail: ole@cancer.dk [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark); Danish Building Research Institute, Aalborg University (Denmark); Andersen, Claus E. [Center for Nuclear Technologies, Radiation Research Division, Riso National Laboratory for Sustainable Energy, Technical University of Denmark, Roskilde (Denmark)] [Center for Nuclear Technologies, Radiation Research Division, Riso National Laboratory for Sustainable Energy, Technical University of Denmark, Roskilde (Denmark); Sorensen, Mette [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark)] [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark); Jovanovic Andersen, Zorana [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark) [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark); Center for Epidemiology Screening, Department of Public Health, University of Copenhagen (Denmark); Gravesen, Peter [Geological Survey of Denmark and Greenland, Copenhagen (Denmark)] [Geological Survey of Denmark and Greenland, Copenhagen (Denmark); Ulbak, Kaare [National Institute of Radiation Protection, Herlev (Denmark)] [National Institute of Radiation Protection, Herlev (Denmark); Hertel, Ole [Department of Environmental Science, Aarhus University, Aarhus (Denmark)] [Department of Environmental Science, Aarhus University, Aarhus (Denmark); Pedersen, Camilla [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark)] [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark); Overvad, Kim [Department of Epidemiology, School of Public Health, Aarhus University, Aarhus (Denmark)] [Department of Epidemiology, School of Public Health, Aarhus University, Aarhus (Denmark); Tjonneland, Anne; Raaschou-Nielsen, Ole [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark)] [Diet, Genes and Environment, Danish Cancer Society Research Centre, Copenhagen (Denmark)

2012-10-15T23:59:59.000Z

308

Overview - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Help > Data Management Help > Data Management Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Overview Welcome to the data management pages for data providers to the ORNL Distributed Active Archive (DAAC). These pages provide an overview of data management planning and preparation and offer practical methods to successfully share and archive your data. Plan - write a short data management plan while preparing your research proposal, Manage - assign logical, descriptive file names, define the contents of your data files, and use consistent data values when preparing

309

Combining Mobile XMPP Entities and Cloud Services for Collaborative Post-Disaster Management in Hybrid Network Environments  

Science Conference Proceedings (OSTI)

Crises such as the Fukushima incident in Japan showed the demand for flexible and easy-to-use monitoring and communication systems to support post-disaster management (i.e. the organization of actions in the follow-up of disasters), especially when critical ... Keywords: XMPP, cloud services, collaboration, mDNS, post-disaster management

Ronny Klauck; Michael Kirsche

2013-04-01T23:59:59.000Z

310

Office of Legacy Management FY 2009 Energy Management Data Report...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Administration Other Agencies You are here Home Office of Legacy Management FY 2009 Energy Management Data Report Office of Legacy Management FY 2009 Energy Management Data...

311

A SAS-macro for estimation of the cumulative incidence using Poisson regression  

Science Conference Proceedings (OSTI)

In survival analyses, we often estimate the hazard rate of a specific cause. Sometimes the main focus is not the hazard rates but the cumulative incidences, i.e., the probability of having failed from a specific cause prior to a given time. The cumulative ... Keywords: Competing risks, Cox regression, Cumulative incidence, Hazard rate, Poisson regression, Survival analysis

Berit Lindum Waltoft

2009-02-01T23:59:59.000Z

312

On the Surface Temperature Sensitivity of the Reflected Shortwave, Outgoing Longwave, and Net Incident Radiation  

Science Conference Proceedings (OSTI)

The global-mean top-of-atmosphere incident solar radiation (ISR) minus the outgoing longwave radiation (OLR) and the reflected shortwave radiation (RSW) is the net incident radiation (NET). This study analyzes the global-mean NET sensitivity to a ...

Hartmut H. Aumann; Alexander Ruzmaikin; Ali Behrangi

2012-10-01T23:59:59.000Z

313

ICT Supply Chain Risk Management  

Science Conference Proceedings (OSTI)

... ICT Supply Chain Risk Management Manager's Forum ... ICT Supply Chain Risk Management National Institute of Standards and Technology Page 6. ...

2013-06-04T23:59:59.000Z

314

Run manager module for CORAL laboratory management  

E-Print Network (OSTI)

This thesis describes a new module, the Run Manager (RM), for Stanford Nanofabrication Facility's Common Object Representation for Advanced Laboratories (CORAL). CORAL is the lab manager with which MIT's Microsystems ...

Klann, Jeffrey G

2004-01-01T23:59:59.000Z

315

Federal Energy Management Program: Best Management Practice:...  

NLE Websites -- All DOE Office Websites (Extended Search)

Single-Pass Cooling Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Single-Pass Cooling Equipment on Facebook Tweet about Federal...

316

Collisionless absorption of light waves incident on overdense plasmas with steep density gradients  

Science Conference Proceedings (OSTI)

Collisionless absorption of laser light incident on overdense plasmas with steep density gradients is studied analytically and numerically. For the normal incidence case, it is shown that both sheath inverse bremsstrahlung and the anomalous skin effect are limiting cases of the same collisionless absorption mechanism. Using particle-in-cell (PIC) plasma simulations, the effects of finite sheath-transit time and finite density gradient are investigated. The analyses are extended to oblique incident cases. For p-polarized obliquely incident light, the results are significantly different from those for the normal incidence case. Most noticeable is the absorption enhancement for the p-polarized light due to the interaction of the electrons with the normal (parallel to the density gradient) component of the laser electric field in the sheath region.

Yang, T.Y.B.; Kruer, W.L.; Langdon, A.B.

1995-07-31T23:59:59.000Z

317

Environmental Management System Plan  

E-Print Network (OSTI)

3) environmental management programs, (4) training, (5)Management Programs3-5 Structure and Responsibility.3-6 Training,Management System Plan Program Elements Additional information regarding EMS training

Fox, Robert

2009-01-01T23:59:59.000Z

318

Federal Energy Management Program: Operations and Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Support to someone by E-mail Management Support to someone by E-mail Share Federal Energy Management Program: Operations and Maintenance Management Support on Facebook Tweet about Federal Energy Management Program: Operations and Maintenance Management Support on Twitter Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Google Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Delicious Rank Federal Energy Management Program: Operations and Maintenance Management Support on Digg Find More places to share Federal Energy Management Program: Operations and Maintenance Management Support on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

319

Energy Star Portfolio Manager  

NLE Websites -- All DOE Office Websites (Extended Search)

May 2013 What's New in Portfolio Manager ? EPA's ENERGY STAR Portfolio Manager tool helps you measure and track energy use, water use, and greenhouse gas emissions of your...

320

Target Cost Management Strategy  

E-Print Network (OSTI)

Target cost management (TCM) is an innovation of Japanese management accounting system and by common sense has been considered with great interest by practitioners. Nowadays, TCM related

Okano, Hiroshi

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

FILE MANAGEMENT MANUAL  

NLE Websites -- All DOE Office Websites (Extended Search)

6.5.2 (ZAP BAD POINTERS) : Appendices :1 Glossary of Important File-Management Terms :29 SPIRES Documentation * SPIRES File Management ***...

322

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011...

323

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 nd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

324

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Second Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY...

325

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fourth Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Actual FY...

326

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 4 th Quarter Metrics Final Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2008 Target FY 2008 Actual...

327

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Final FY...

328

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

329

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 st Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

330

Waterway Management Districts (Indiana)  

Energy.gov (U.S. Department of Energy (DOE))

Waterway management districts are established to manage and supervise the use and development of waterways in municipalities with populations between 29,600 and 29,900.

331

K&N Management  

Science Conference Proceedings (OSTI)

... K&N Management (PDF version of this profile). (Photo courtesy of K&N Management). Download high-res version of this photo. ...

2011-04-19T23:59:59.000Z

332

Data Management Policy The  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Management Policy The guidelines below describe Data Management procedures, processes and resources that need to be understood by both user projects and in-house research. 1....

333

Data Management Webinar  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Data Management Best Practices Webinar Environmental Data Management Best Practices Webinar NASA EarthData Webinar Series September 10, 11, and 12, 2013 Abstract The...

334

Stormwater Management Program (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

Stormwater Management program of the Department of Environmental Protection's Bureau of Conservation and Restoration administers the rules and regulations for stormwater management for Pennsylvania...

335

ALS Project Management Manual  

E-Print Network (OSTI)

management practices across all ALS projects. It describesthat the primary weakness in ALS project management effortsrich projects common at the ALS. It is sometimes difficult

Krupnick, Jim; Harkins, Joe

2000-01-01T23:59:59.000Z

336

Corrective Action Management Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Corrective Action Management Program (CAMP) Home CAMP Background DOE Directives Corrective Action Management Team Corrective Action Tracking System (CATS) CAMP Quarterly Reports...

337

Emergency Management Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Emergency Management Evaluations Reports 2010 Independent Oversight Review of Emergency Management at the Pantex Site Office and Pantex Plant, November 2010 Independent Oversight...

338

Chemical Management (Vol. 2 of 3)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

i i TS DOE-HDBK-1139/2-2006 AUGUST 2006 DOE HANDBOOK CHEMICAL MANAGEMENT (Volume 2 of 3) Chemical Safety and Lifecycle Management U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE DOE-HDBK-1139/2-2006 ii Available on the Department of Energy Technical Standards Program Web site http://standards.doe.gov DOE-HDBK-1139/2-2006 iii Foreword During the last several years, the Department of Energy (DOE) complex has averaged one chemical incident per day. DOE considers this rate to be unacceptable. In an effort to address

339

PROJECT MANAGEMENT PLANS Project Management Plans  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT PLANS MANAGEMENT PLANS Project Management Plans  Overview  Project Management Plan Suggested Outline Subjects  Crosswalk between the Suggested PMP Outline Subjects and a Listing of Project Planning Elements  Elements of Deactivation Project Planning  Examples From Project Management Plans Overview The purpose here is to assist project managers and project planners in creating a project plan by providing examples and pointing to information that have been successfully used by others in the past. Section 4.2 of DOE Guide 430.1-3, DEACTIVATION IMPLEMENTATION GUIDE discusses the content and purpose of deactivation project management plans. It is presented as a suggested outline followed by other potential subjects. For the convenience of readers, that information is repeated below.

340

Federal Energy Management Program: Energy Management Requirements by Law  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Requirements by Law and Regulation to someone by E-mail Share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Facebook Tweet about Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Twitter Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Google Bookmark Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Delicious Rank Federal Energy Management Program: Energy Management Requirements by Law and Regulation on Digg Find More places to share Federal Energy Management Program: Energy Management Requirements by Law and Regulation on AddThis.com... Requirements by Subject Requirements by Regulation

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Laboratory Management (Quality) Systems  

Science Conference Proceedings (OSTI)

Laboratory Management (Quality) Systems. NISTIR 7028 Type Evaluation Quality Manual Template. This NISTIR has been ...

2012-05-02T23:59:59.000Z

342

ADMINISTRATIVE AND RESOURCE MANAGEMENT  

E-Print Network (OSTI)

development of risk management- relatedITservicesthatbenefittheentireUCsystem. The systems developed at UC and maintenance have diminished so dramatically. #12;7 ADMINISTRATIVE AND RESOURCE MANAGEMENT AnnuAl RepoRt 2010, are collaborating to implement a new asset management, work management, and integrated planning system

Hammock, Bruce D.

343

Environmental Management System Plan  

E-Print Network (OSTI)

offices, the EMS Program Program Elements Environmental ManagementOffice of Institutional Assurance as stated in the OQMP. 3-7 Environmental ManagementEnvironmental Management System Fiscal Year Improve (EMP classification) Integrated Safety Management System International Organization for Standardization Lawrence Berkeley National Laboratory Office

Fox, Robert

2009-01-01T23:59:59.000Z

344

Los Alamos National Laboratory emergency management plan. Revision 1  

SciTech Connect

The Laboratory has developed this Emergency Management Plan (EMP) to assist in emergency planning, preparedness, and response to anticipated and actual emergencies. The Plan establishes guidance for ensuring safe Laboratory operation, protection of the environment, and safeguarding Department of Energy (DOE) property. Detailed information and specific instructions required by emergency response personnel to implement the EMP are contained in the Emergency Management Plan Implementing Procedure (EMPIP) document, which consists of individual EMPIPs. The EMP and EMPIPs may be used to assist in resolving emergencies including but not limited to fires, high-energy accidents, hazardous material releases (radioactive and nonradioactive), security incidents, transportation accidents, electrical accidents, and natural disasters.

Ramsey, G.F.

1998-07-15T23:59:59.000Z

345

Cryptographic Key Management Workshop 2010  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2010. Purpose: ... Related Project(s): Cryptographic Key Management Project. Details: ...

2013-08-01T23:59:59.000Z

346

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Management System Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email Managing our effects on the environment We are committed to protecting the environment while conducting our national security and energy-related missions. Laboratory Environmental Governing Policy What is the Environmental Management System? It covers every program in the Laboratory

347

LPP Risk Management Plan  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

History and Process History and Process Slide 2 M E Environmental Management Environmental Management History ◦ Current Baseline Process Overview ◦ Identification ◦ Simulation ◦ Management Successes & Challenges Slide 3 M E Environmental Management Environmental Management Current Baseline Risks ◦ 1 Week Risk Summit held week of August 4 th , 2008 Broad representation from all levels of Isotek, DOE, PTC, and outside consultants Focused on risk and opportunity identification Included risk description, assumptions, and triggers No quantification or analysis No restrictions, constraints, or filtering HQ provided facilitator Prescribed format and capture methodology Slide 4 M E Environmental Management Environmental Management Current Baseline Risks ◦ Risk Summit Results

348

Office of Resource Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Resource Management Resource Management Home Sub Offices › Business Operations › Information Management › Human Resources and Administration Mission and Functions HSS Standard Operating Practices (For Internal Users Only) HSS Subject Matter Experts and Functional Points of Contacts Contact Us HSS Logo Office of Resource Management Direct Report to the Chief Health, Safety and Security Officer Mission and Functions Mission The Office of Resource Management supports the infrastructure of the Office of Health, Safety and Security (HSS) by providing balanced, unbiased, technically competent, and customer focused services in the areas of: (1) Financial Management, including budget formulation and execution; (2) Procurement Management, including contract and credit card programs; (3) Information Management, including technology-based solutions and programs; (4) Quality Assurance; (5) Human Resources, including recruitment and retention programs; (6) Administrative Services, including property management, travel, and work space management; and; (7) Strategic and Program Planning including performance and efficiency measures.

349

Fuel Tax Incidence in Developing Countries: The Case of Costa Rica | Open  

Open Energy Info (EERE)

Tax Incidence in Developing Countries: The Case of Costa Rica Tax Incidence in Developing Countries: The Case of Costa Rica Jump to: navigation, search Name Fuel Tax Incidence in Developing Countries: The Case of Costa Rica Agency/Company /Organization Resources for the Future Sector Energy Focus Area Conventional Energy Topics Finance, Market analysis, Background analysis Resource Type Lessons learned/best practices Website http://www.rff.org/RFF/Documen Country Costa Rica UN Region Latin America and the Caribbean References Fuel Tax Incidence in Developing Countries: The Case of Costa Rica[1] Abstract "Although fuel taxes are a practical means of curbing vehicular air pollution, congestion, and accidents in developing countries-all of which are typically major problems-they are often opposed on distributional

350

A Simple Physical Model to Estimate Incident Solar Radiation at the Surface from GOES Satellite Data  

Science Conference Proceedings (OSTI)

We present a model designed to estimate the incident solar radiation at the suface from GOES satellite brightness measurements in clear and cloudy conditions. In this simple physical model, the effect of Rayleigh scattering is taken into account. ...

Catherine Gautier; Georges Diak; Serge Masse

1980-08-01T23:59:59.000Z

351

Lagrangian Drifter Dispersion in the Surf Zone: Directionally Spread, Normally Incident Waves  

Science Conference Proceedings (OSTI)

Lagrangian drifter statistics in a surf zone wave and circulation model are examined and compared to single- and two-particle dispersion statistics observed on an alongshore uniform natural beach with small, normally incident, directionally ...

Matthew Spydell; Falk Feddersen

2009-04-01T23:59:59.000Z

352

The Use of DFDR Information in the Analysis of a Turbulence Incident over Greenland  

Science Conference Proceedings (OSTI)

Digital flight data recorder (DFDR) tapes from commercial aircraft can provide useful information about the mesoscale environment of severe turbulence incidents. Air motion computations from these data and their errors are briefly described. An ...

Peter F. Lester; Orhan Sen; R. E. Bach Jr.

1989-05-01T23:59:59.000Z

353

Recent breast cancer incidence trends according to hormone therapy use: the California Teachers Study cohort  

E-Print Network (OSTI)

breast cancer incidence trends according to hormone therapyA, Ward E, Thun MJ: Recent trends in breast cancer incidencein France: a paradoxical trend. Bull Cancer 10. Katalinic A,

2010-01-01T23:59:59.000Z

354

US DOE/NNSA and DoD Response to 2011 Fukushima Incident: Radiological...  

NLE Websites -- All DOE Office Websites (Extended Search)

US DOENNSA and DoD Response to 2011 Fukushima Incident: Radiological Soil Samples BusinessUSA DataTools Apps Challenges Let's Talk BusinessUSA You are here Data.gov ...

355

Some Effects of the Yellowstone Fire Smoke Cloud on Incident Solar Irradiance  

Science Conference Proceedings (OSTI)

The influence of the 1988 Yellowstone National Park fire, smoke cloud on incident broadband and spectral solar irradiance was studied using measurements made at the Solar Energy Research Institute's Solar Radiation Research Laboratory, Golden, ...

Roland L. Hulstrom; Thomas L. Stoffel

1990-12-01T23:59:59.000Z

356

Federal Energy Management Program: Energy Management Requirements...  

NLE Websites -- All DOE Office Websites (Extended Search)

Law and Regulation Federal agencies must meet energy management requirements outlined by Federal various statutory laws and regulations. They include: National Energy Conservation...

357

Office of Environmental Management | Department of Energy  

Office of Environmental Management (EM)

Environmental Management Search form Search Office of Environmental Management Services Waste Management Site & Facility Restoration Program Management Communication & Engagement...

358

Federal Energy Management Program: Best Management Practice: Information  

NLE Websites -- All DOE Office Websites (Extended Search)

Information and Education Programs to someone by E-mail Information and Education Programs to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Information and Education Programs on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Information and Education Programs on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Google Bookmark Federal Energy Management Program: Best Management Practice: Information and Education Programs on Delicious Rank Federal Energy Management Program: Best Management Practice: Information and Education Programs on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Information and Education Programs on AddThis.com...

359

Federal Energy Management Program: Best Management Practice: Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Commercial Kitchen Equipment to someone by E-mail Commercial Kitchen Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Google Bookmark Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Delicious Rank Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Commercial Kitchen Equipment on AddThis.com... Sustainable Buildings & Campuses

360

Federal Energy Management Program: Best Management Practice: Alternate  

NLE Websites -- All DOE Office Websites (Extended Search)

Alternate Water Sources to someone by E-mail Alternate Water Sources to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Google Bookmark Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Delicious Rank Federal Energy Management Program: Best Management Practice: Alternate Water Sources on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Alternate Water Sources on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Federal Energy Management Program: Bureau of Land Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Bureau of Land Management - Campground, Utah to someone by E-mail Share Federal Energy Management Program: Bureau of Land Management - Campground, Utah on Facebook Tweet about...

362

Federal Energy Management Program: DOE Enhances Management of...  

NLE Websites -- All DOE Office Websites (Extended Search)

resource Send a link to Federal Energy Management Program: DOE Enhances Management of Energy Savings Performance Contracts to someone by E-mail Share Federal Energy Management...

363

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal laws and regulations related to energy management. General Guidance for Facilities Overview of Federal Energy Management Policy and Mandates: Guidance document outlining Federal energy management goals and requirements for Federal energy managers. Sustainability Requirement Crosswalk: Crosswalk of sustainability and energy goals and targets within executive orders and other statutes. Guidelines Establishing Criteria for Excluding Buildings from the Energy Performance Requirements of Section 543 of the National Energy Conservation Policy Act as Amended by the Energy Policy Act of 2005 (EPAct 2005): Guidelines that established criteria for exclusions from the energy performance requirement for a fiscal year or any Federal building or collection of Federal buildings within the statutory framework provided by the law.

364

Plan - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Plan Plan Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Plans NASA's Terrestrial Ecology Program now requires that each proposal include a Data Management Plan (DMP) of up to two pages. A DMP for a proposal is a brief document that outlines what you will do with your data during and after your research, to ensure your data will be safe, documented, and accessible now and in the future. A DMP - developed early and used throughout the research project - will increase research efficiency by making the data understandable and usable in the future and

365

Depleted Uranium Hexafluoride Management  

NLE Websites -- All DOE Office Websites (Extended Search)

for for DUF 6 Conversion Project Environmental Impact Statement Scoping Meetings November/December 2001 Overview Depleted Uranium Hexafluoride (DUF 6 ) Management Program DUF 6 EIS Scoping Briefing 2 DUF 6 Management Program Organizational Chart DUF 6 Management Program Organizational Chart EM-10 Policy EM-40 Project Completion EM-20 Integration EM-50 Science and Technology EM-31 Ohio DUF6 Management Program EM-32 Oak Ridge EM-33 Rocky Flats EM-34 Small Sites EM-30 Office of Site Closure Office of Environmental Management EM-1 DUF 6 EIS Scoping Briefing 3 DUF 6 Management Program DUF 6 Management Program * Mission: Safely and efficiently manage the DOE inventory of DUF 6 in a way that protects the health and safety of workers and the public, and protects the environment DUF 6 EIS Scoping Briefing 4 DUF 6 Inventory Distribution

366

LFRG Program Management Plan  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of the EM Low-Level Waste Disposal Facility Federal Review Group Program Management Plan (LFRG PMP) is to establish the LFRG roles and responsibilities, the LFRG management processes,...

367

Power Management Controls  

NLE Websites -- All DOE Office Websites (Extended Search)

additional savings of 1.3 billion are lost because power management is present, but disabled. In some cases, power management is not compatible with the application or doesn't...

368

Coastal Management Act (Georgia)  

Energy.gov (U.S. Department of Energy (DOE))

The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

369

Chemical Lifecycle Management Cost  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemical Lifecycle Management Cost Presented by: J.M. Hieb, CH2M HILL Plateau Remediation Company CHPRC1204-04 Chemical Lifecycle Management Cost Everyone is trying to stretch a...

370

US CMS Program Management  

NLE Websites -- All DOE Office Websites (Extended Search)

USCMS US CMS Home US CMS @ Work US CMS Research Program Management Joel Butler, US CMS Research Program Manager E-mail: butler@fnal.gov Phone: (630) 840-3148, Fax: (630) 840-2194...

371

Personalized diabetes management  

E-Print Network (OSTI)

In this thesis, we present a system to make personalized lifestyle and health decisions for diabetes management, as well as for general health and diet management. In particular, we address the following components of the ...

O'Hair, Allison Kelly

2013-01-01T23:59:59.000Z

372

Optimizing IT process management  

Science Conference Proceedings (OSTI)

In this paper, the author discusses some key concepts in IT process management. The paper also includes the recommendations in these following aspects: team organization, physical environment, project selection, politics, organizational communication, ... Keywords: IT process management

Tony Tony Lee

2010-07-01T23:59:59.000Z

373

Emergency Management Forum  

NLE Websites -- All DOE Office Websites (Extended Search)

EM Forum The Oak Ridge Emergency Management Forum is sponsored by the U.S. Department of Energy (DOE) Oak Ridge Office (ORO) and Tennessee Emergency Management Agency (TEMA). Each...

374

Energy manager design for microgrids  

E-Print Network (OSTI)

Energy Manager Design for Microgrids Hillier, F. , and G.Energy Manager Design for Microgrids Appendix A: Smart*DER:Manager Design for Microgrids Prepared for the California

Firestone, Ryan; Marnay, Chris

2005-01-01T23:59:59.000Z

375

Use Portfolio Manager | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Use Portfolio Manager Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial...

376

Energy manager design for microgrids  

E-Print Network (OSTI)

to a building energy management system already in place to2003. Microgrid Energy Management System Oak Ridge, TN:better. The term energy management systems (EMS) is widely

Firestone, Ryan; Marnay, Chris

2005-01-01T23:59:59.000Z

377

Meter Data Management  

Science Conference Proceedings (OSTI)

The traditional role of Meter Data Management (MDM) systems has been to acquire and prepare meter data for billing purposes, but these systems have much wider operational value for utilities. Advanced MDM systems could reshape electric power delivery, management, and economics if their cost and complexity could be managed. This White Paper lays out the potential advantages of improved Meter Data Management Systems (MDMS), discusses possible deployment strategies for such systems, and provides a descripti...

2008-07-07T23:59:59.000Z

378

Asset Management Best Practices  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) has conducted a series of surveys on the status of the implementation of power delivery asset management and the maintenance of key substation components. The results will assist utilities in determining how to best adapt or adopt the principles of asset management in their organizations. This technical update presents the results of surveys covering organizational and technical aspects of asset management, including detailed questions on the management of pow...

2010-12-23T23:59:59.000Z

379

System and Network Management  

Science Conference Proceedings (OSTI)

This document covers Systems and Network Management Requirements and is the first deliverable in a joint EPRI and Utility User Project to develop Network Management capability for Electric Utility Automation Systems (UAS) using international communication standards such as IEC 61850. The management of substation automation systems is critical since tools are now based, for the most part, on proprietary hardware and software. In modern state-of-the art substations, traditional network management has ...

2012-12-20T23:59:59.000Z

380

Maintenance and Veg Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Functions Infrastructure projects Interconnection OASIS OATT Reauthorization of Transmission Line Permits, Maintenance and Vegetation Management on Forest Service Lands...

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Prevention of a wrong-location misadministration through the use of an intradepartmental incident learning system  

SciTech Connect

Purpose: A series of examples are presented in which potential errors in the delivery of radiation therapy were prevented through use of incident learning. These examples underscore the value of reporting near miss incidents. Methods: Using a departmental incident learning system, eight incidents were noted over a two-year period in which fields were treated 'out-of-sequence,' that is, fields from a boost phase were treated, while the patient was still in the initial phase of treatment. As a result, an error-prevention policy was instituted in which radiation treatment fields are 'hidden' within the oncology information system (OIS) when they are not in current use. In this way, fields are only available to be treated in the intended sequence and, importantly, old fields cannot be activated at the linear accelerator control console. Results: No out-of-sequence treatments have been reported in more than two years since the policy change. Furthermore, at least three near-miss incidents were detected and corrected as a result of the policy change. In the first two, the policy operated as intended to directly prevent an error in field scheduling. In the third near-miss, the policy operated 'off target' to prevent a type of error scenario that it was not directly intended to prevent. In this incident, an incorrect digitally reconstructed radiograph (DRR) was scheduled in the OIS for a patient receiving lung cancer treatment. The incorrect DRR had an isocenter which was misplaced by approximately two centimeters. The error was a result of a field from an old plan being scheduled instead of the intended new plan. As a result of the policy described above, the DRR field could not be activated for treatment however and the error was discovered and corrected. Other quality control barriers in place would have been unlikely to have detected this error. Conclusions: In these examples, a policy was adopted based on incident learning, which prevented several errors, at least one of which was potentially severe. These examples underscore the need for a rigorous, systematic incident learning process within each clinic. The experiences reported in this technical note demonstrate the value of near-miss incident reporting to improve patient safety.

Ford, Eric C.; Smith, Koren; Harris, Kendra; Terezakis, Stephanie [Department of Radiation Oncology and Molecular Radiation Sciences, Johns Hopkins University, Baltimore, Maryland 21231 (United States)

2012-11-15T23:59:59.000Z

382

Management Transition Guidance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Records and Information Records and Information Management Transition Guidance November 2013 Records and Information Management Transition Guidance i Records and Information Management Transition Guidance Table of Contents Executive Summary ........................................................................................................................ 1 1.0 Introduction and Purpose ..................................................................................................... 1 LM Records Functions ................................................................................................................ 1 2.0 The Records Life Cycle ....................................................................................................... 2 3.0 Organizational Responsibilities ........................................................................................... 2

383

Towards inclusive identity management  

Science Conference Proceedings (OSTI)

The article argues for a shift of perspective in identity management (IDM) research and development. Accessibility and usability issues affect identity management to such an extent that they demand a reframing and reformulation of basic designs and requirements ... Keywords: Authentication, Disabilities, E-Inclusion, Exclusion, Identity management, Information security, Privacy, Universal design, Usability

Lothar Fritsch; Kristin Skeide Fuglerud; Ivar Solheim

2010-12-01T23:59:59.000Z

384

Procurement and Property Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Definitions Related to Pre-Qualification Questionnaire Definitions Related to Pre-Qualification Questionnaire SELECTION OF SAFE CONTRACTORS The following is an explanation of information required for Attachment II: Three sources of information provide ways for owners to evaluate the probable safety performance of prospective contractors: - Experience modification rates for workers' compensation insurance - OSHA incidence rates for recordable injuries and illnesses - Contractor safety attitudes and practices The reliability of OSHA incidence rates is solely dependent on judicious reporting by the employer, while the EMRs are established by independent rating bureaus. Although the EMR is a more objective measure than the OSHA incidence rate, there is a correlation between them. Both will indicate past safety performance.

385

Radioactive Waste Management Basis  

SciTech Connect

The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

Perkins, B K

2009-06-03T23:59:59.000Z

386

ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ENVIRONMENTAL ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF ENVIRONMENTAL MANAGEMENT OFFICE OF EM Recovery NEWS FLASH RECOVERY.GOV March 10, 2011 American Recovery and Reinvestment Act Payments Surge Past $4 Billion U.S. Depar tment of Energy | Office of Environmental Management For More Information on EM Recovery Act Work, Visit Us on the Web: http://www.em.doe.gov/emrecovery/ FINANCIAL HIGHLIGHTS * More than $4 BILLION in Recovery Act payments are accelerating environmental cleanup * 67% of EM Recovery Act funds have been paid Financial data are based on reporting as of March 9, 2011, and are subject to change. EM has made more than $4 billion in Recovery Act payments, or 32 percent of the DOE's $12.4 billion in Recovery Act payments. DOE received $35.2 billion

387

SHSD Manager Safety Engineering Group Manager  

E-Print Network (OSTI)

Safety, Excavation Safety, Scaffold Safety D. Cubillo: Division Database Programmer J. Durnan: Design. Horn (0.5) ORPS Categorizer S. Moss (Emeritus) S. Kane, Group Manager 9/7/10 Environment, Safety

388

Federal Energy Management Program: Federal Energy Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Program Contacts Contact Us By phone: 202-586-5772 By mail: U.S. Department of Energy EE-2L 1000 Independence Ave., S.W. Washington, D.C. 20585-0121 Contact...

389

Integrated Safety Management (ISM)  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Safety Management Integrated Safety Management Home ISM Policy ISM Champions ISM Workshops Resources Archives Contact Us Health and Safety HSS Logo Integrated Safety Management (ISM) ism logo Welcome to the Department of Energy's Office of Health, Safety and Security (HSS) Integrated Safety Management (ISM) Web Site. The Department and its contractors remain firmly committed to ISM as first defined in 1996. The objective of ISM is to perform work in a safe and environmentally sound manner. More specifically, as described in DOE P 450.4, Safety Management System Policy: "The Department and Contractors must systematically integrate safety into management and work practices at all levels so that missions are accomplished while protecting the public, the worker, and the environment. This is to be accomplished through effective integration of safety management into all facets of work planning and execution." "

390

Management of Contaminated Autologous Grafts in Plastic Surgery  

E-Print Network (OSTI)

Background: Contamination of autologous grafts unfortunately occurs in plastic surgery, but the literature provides no guidance for management of such incidents. Methods: American Society of Aesthetic Plastic Surgery members were asked to complete an online survey that asked about the number and causes of graft contaminations experienced, how surgeons dealt with the problem, the clinical outcomes, and patient disclosure. Results: Nineteen hundred surgeons were asked to participate in the survey, and 223 responded. Of these, 70 % had experienced at least 1 graft contamination incident, with 26 % experiencing 4 or more. The most frequently reported reason for graft contamination was a graft falling on the floor (reported by 75%). Nearly two thirds of the contaminated grafts related to craniofacial procedures. Ninety-four percent of grafts were managed with decontamination and completion of the operation. The most common method of decontamination was washing with povidone-iodine, but this practice is contrary to recommendations in the literature. Only 3 surgeons (1.9%) said a clinical infection developed following decontaminated graft use. Patients were not informed in 60 % of graft contamination incidents. The survey results and review of the literature led

Robert F. Centeno; A Ankit R. Desai; Marla E. Watson; Ma C

2008-01-01T23:59:59.000Z

391

Identity Management Systems Program Homepage  

Science Conference Proceedings (OSTI)

Identity Management Systems Program. ... Identity management systems are responsible for the creation, use, and termination of electronic identities. ...

2010-10-05T23:59:59.000Z

392

Managed Programs, Environmental Protection Division  

NLE Websites -- All DOE Office Websites (Extended Search)

training and supporting subject matter expertise. Environmental Information Management System: storing, managing, verifying, protecting, retrieving and archiving BNL's...

393

Incident-Energy Dependent Quenching of the Analyzing Power in Pre-Equilibrium Composite Particle Emission  

Science Conference Proceedings (OSTI)

The proton-induced pre-equilibrium process in the energy range of 100 to 160 MeV, which leads to emission of composite ejectiles such as {sup 3}He and {alpha}-particles, is discussed. New cross section and analyzing power measurements for the (p,{sup 3}He) reaction on {sup 93}Nb at an incident energy of 160 MeV are presented, and these are found to be in agreement with the prediction of a statistical multistep theoretical formulation. The observed quenching of the analyzing power is also reproduced well by the theory. The results are consistent with earlier work at lower incident energies and other nuclear species.

Cowley, A. A. [Physics Department, Stellenbosch University, Private Bag X1, Matieland 7602 (South Africa); iThemba LABS, PO Box 722, Somerset West 7129 (South Africa); Dimitrova, S. S. [Institute for Nuclear Research and Nuclear Energy, Bulgarian Academy of Sciences, 1784 Sofia (Bulgaria); Zyl, J. J. van [Physics Department, Stellenbosch University, Private Bag X1, Matieland 7602 (South Africa)

2011-10-28T23:59:59.000Z

394

Analysis of the incidence angle of the beam radiation on CPC. [Compound Parabolic Concentrator  

SciTech Connect

Analytic expressions have been derived for the projected incidence angles {var theta}{sub 1} and {var theta}{sub 2} from a two-dimensional compound parabolic concentrator solar collector. For a CPC the fraction of the incident rays on the aperture at angle {var theta}, which reaches the absorber, depends only on the {var theta}{sub 1} angle. In this paper, a mathematical expression for {var theta}{sub 1} and {var theta}{sub t} has been calculated to determine the times at which acceptance of the sun's beam radiation begins and ceases for a CPC consisting of arbitrary orientation.

Pinazo, J.M.; Canada, J.; Arago, F. (Univ. Politecnica de Valencia (Spain))

1992-09-01T23:59:59.000Z

395

Program Planning & Management Forms (5000-5999) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Planning & Management Forms (5000-5999) Program Planning & Management Forms (5000-5999) Program Planning & Management Forms (5000-5999) DOE F 5160.1 (pdf) Reprogramming, Restructuring, and Appropriation Transfer Summary DOE F 5480.4 (pdf) Contractor Employee Occupational Safety or Health Complaint DOE F 5484.3 (pdf) Individual Accident/Incident Report DOE F 5484.4 (pdf) Tabulation of Work-Hours and Vehicle Usage, and Property Valuation DOE F 5500.2 (pdf) Operational Incident Report DOE F 5631.18 (pdf) Security Acknowledgement DOE F 5631.20 (fillable pdf) Request for Visit or Access Approval DOE F 5631.29 (pdf) Security Termination Statement DOE F 5631.34 (pdf) Data Report on Spouse/Cohabitant DOE F 5634.1 (pdf) Safeguards and Security Survey Report DOE F 5635.9 (pdf) Record of Destruction

396

Enabling decentralised management through federation  

Science Conference Proceedings (OSTI)

Cross-domain management is an increasingly important concern in network management and such management capability is a key-enabler of many emerging computing environments. This paper analyses the requirements for management systems that aim to support ... Keywords: Federation, Management, Policy-based management, Semantics, Telecommunications

Kevin Feeney; Rob Brennan; John Keeney; Hendrik Thomas; Dave Lewis; Aidan Boran; Declan O'Sullivan

2010-11-01T23:59:59.000Z

397

Federal Energy Management Program: Federal Energy and Water Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Energy and Federal Energy and Water Management Awards to someone by E-mail Share Federal Energy Management Program: Federal Energy and Water Management Awards on Facebook Tweet about Federal Energy Management Program: Federal Energy and Water Management Awards on Twitter Bookmark Federal Energy Management Program: Federal Energy and Water Management Awards on Google Bookmark Federal Energy Management Program: Federal Energy and Water Management Awards on Delicious Rank Federal Energy Management Program: Federal Energy and Water Management Awards on Digg Find More places to share Federal Energy Management Program: Federal Energy and Water Management Awards on AddThis.com... Project Assistance Training Outreach Awards for Saving Energy Federal Energy and Water Management Better Buildings Federal Award

398

Federal Energy Management Program: Interagency Energy Management Task Force  

NLE Websites -- All DOE Office Websites (Extended Search)

About the Program About the Program Site Map Printable Version Share this resource Send a link to Federal Energy Management Program: Interagency Energy Management Task Force Members to someone by E-mail Share Federal Energy Management Program: Interagency Energy Management Task Force Members on Facebook Tweet about Federal Energy Management Program: Interagency Energy Management Task Force Members on Twitter Bookmark Federal Energy Management Program: Interagency Energy Management Task Force Members on Google Bookmark Federal Energy Management Program: Interagency Energy Management Task Force Members on Delicious Rank Federal Energy Management Program: Interagency Energy Management Task Force Members on Digg Find More places to share Federal Energy Management Program: Interagency Energy Management Task Force Members on AddThis.com...

399

Critical Incident and Disaster Response Policy Commencement Date: 9 December, 1992  

E-Print Network (OSTI)

Critical Incident and Disaster Response Policy Commencement Date: 9 December, 1992 Category STATEMENT 5.1 The University shall establish a comprehensive and integrated Disaster Response Plan and appropriate measures are in place to prevent predictable or potential disasters and possible critical

400

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape  

Science Conference Proceedings (OSTI)

We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter), whose objective is to detect and identify propagating malwares. The nicter mainly monitors darknet, a set of unused IP addresses, to observe global ... Keywords: correlation analysis, malware analysis, network monitoring

Masashi Eto; Daisuke Inoue; Jungsuk Song; Junji Nakazato; Kazuhiro Ohtaka; Koji Nakao

2011-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Oscillating two stream instability at the resonance of obliquely incident radiation in inhomogeneous plasmas  

SciTech Connect

The growth rate and the threshold value were calculated for the oscillating two-stream instability for an electromagnetic wave obliquely incident on an inhomogeneous plasma. The localization of the instability is found to be in the overdense region near the threshold and to shift toward the local plasma resonance when the pump intensity increases. (auth)

Kuo, Y.Y.; Oberman, C.; Liu, C.S.; Troyon, F.

1975-10-01T23:59:59.000Z

402

Emergency Action Plan For incidents involving hazardous materials, fires, explosions, or natural gas  

E-Print Network (OSTI)

-492-6025. For Non-Emergency Fire and Natural Gas Questions call the CU Fire Marshall @ 303-492-4042. AdditionalEmergency Action Plan For incidents involving hazardous materials, fires, explosions, or natural gas leaks, the following actions should be taken: 1) Life Safety First 2) Evacuate Immediate Area 3

Colorado at Boulder, University of

403

Revised rail-stop exposure model for incident-free transport of nuclear waste  

SciTech Connect

This report documents a model for estimating railstop doses that occur during incident-free transport of nuclear waste by rail. The model, which has been incorporated into the RADTRAN III risk assessment code, can be applied to general freight and dedicated train shipments of waste.

Ostmeyer, R.M.

1986-02-01T23:59:59.000Z

404

Ambient air pollution exposure and the incidence of related health effects among racial/ethnic minorities  

Science Conference Proceedings (OSTI)

Differences among racial and ethnic groups in morbidity and mortality rates for diseases, including diseases with environmental causes, have been extensively documented. However, documenting the linkages between environmental contaminants, individual exposures, and disease incidence has been hindered by difficulties in measuring exposure for the population in general and for minority populations in particular. After briefly discussing research findings on associations of common air pollutants with disease incidence, the authors summarize recent studies of radial/ethnic subgroup differences in incidence of these diseases in the US. They then present evidence of both historic and current patterns of disproportionate minority group exposure to air pollution as measured by residence in areas where ambient air quality standards are violated. The current indications of disproportionate potential exposures of minority and low-income populations to air pollutants represent the continuation of a historical trend. The evidence of linkage between disproportionate exposure to air pollution of racial/ethnic minorities and low-income groups and their higher rates of some air pollution-related diseases is largely circumstantial. Differences in disease incidence and mortality rates among racial/ethnic groups are discussed for respiratory diseases, cancers, and lead poisoning. Pollutants of concern include CO, Pb, SO{sub 2}, O{sub 3}, and particulates.

Nieves, L.A.; Wernette, D.R.

1997-02-01T23:59:59.000Z

405

Program Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Management Management Program Management Safety The Office of Environmental Management's (EM) top priority is to ensure proper implementation and continuous improvement of Integrated Safety Management Systems (ISMS) in the EM complex and to serve as a focal point for EM safety standards and policy development and interpretation and interfaces with internal/external oversight organizations Read more Acquisition The Office of Environmental Management strives to assure effective project, acquisition, and contract management, by working closely with senior level officials in Headquarters and Field Managers; external stakeholders; and major contractors for the purpose of achieving acquisition and project management objectives of the Office of Environmental Management (EM)

406

Business System Management Review  

NLE Websites -- All DOE Office Websites (Extended Search)

P-004 Business System Management Review Process 11_0304Page 1 of 7 P-004 Business System Management Review Process 11_0304Page 1 of 7 EOTA - Business Process Document Title: Business System Management Review Process Document Number: P-004 Rev 11_0304 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): F-009, Business System Management Review Template P-004 Business System Management Review Process 11_0304Page 2 of 7 Revision History: Rev. Description of Change A Initial Release 08_0414 Corrective Actions, Preventive Actions, and Improvement Opportunity 09_1124 Edited document for clarity and to better fit the process in use. Added requirement to provide management with

407

Storm Water Management Fact Sheet Employee Training DESCRIPTION  

E-Print Network (OSTI)

In-house employee training programs are established to teach employees about storm water management, potential sources of contaminants, and Best Management Practices (BMPs). Employee training programs should instill all personnel with a thorough understanding of their Storm Water Pollution Prevention Plan (SWPPP), including BMPs, processes and materials they are working with, safety hazards, practices for preventing discharges, and procedures for responding quickly and properly to toxic and hazardous material incidents. APPLICABILITY Typically, most industrial facilities have employee training programs. Usually these address such areas as health and safety training and fire protection. Training on storm water management and BMPs can be incorporated into these programs. Employees can be taught through 1) posters, employee meetings, courses, and bulletin boards about storm water management, potential contaminant sources, and prevention of contamination in surface water runoff, and 2) field training programs that show areas of potential storm water contamination and associated pollutants, followed by a discussion of site-specific BMPs by trained personnel. ADVANTAGES AND DISADVANTAGES The program can be standardized and repeated as necessary, both to train new employees and to keep its objectives fresh in the minds of more senior employees. A training program is also flexible and can be adapted as a facilitys storm water management needs change over time. Obstacles to an employee training program include: C Lack of commitment from senior management.

United States

1999-01-01T23:59:59.000Z

408

Premises Energy Management  

Science Conference Proceedings (OSTI)

Premises energy management describes the automated management of electric appliances. The objective of the premises energy management system (PEMS) is to provide a value-added service to the PEMS owner and a single interface for the utility through which aggregated grid services can be supplied. This report provides two contributions to existing research: a functional requirement literature review and a simulated PEMS performance analysis.

2011-11-09T23:59:59.000Z

409

Depleted Uranium Hexafluoride Management  

NLE Websites -- All DOE Office Websites (Extended Search)

OFFICE OF DEPLETED URANIUM HEXAFLUORIDE MANAGEMENT Issuance Of Final Report On Preconceptual Designs For Depleted Uranium Hexafluoride Conversion Plants The Department of Energy...

410

EMERGENCY MANAGEMENT (EM)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT (EM) MANAGEMENT (EM) OBJECTIVE EM.1 A routine drill program and emergency operations drill program, including program records, have,been established and implemented. (Core Requirement 11) Criteria 1. Emergency preparedness drills and exercises are conducted and an adequate response capability,exists. 2. Routine operations drills and exercises are conducted and an adequate response capability exists. 3. Applicable emergency management documentation (e.g., Building Emergency Plan, emergency,response procedures, Emergency Preparedness Hazards Assessment, alarm response procedures,,and emergency response procedures) has been updated to reflect implementation of the TA-55 . Approach Record Reviews: Review the emergency management documents (e.g., Building

411

Federal Identity Management Handbook  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Identity Management Handbook Federal Identity Management Handbook Version 0.1 December 2005 VERSION 0.1 Federal Identity Management Handbook Acknowledgements The Office of Management and Budget and the Federal Identity Credentialing Committee would like to acknowledge the significant contributions of the National Institute of Standards and Technology (NIST) and the Government Smart Card Interagency Advisory Board (IAB) for providing valuable contributions to the development of this handbook. A special thanks goes out to those who participated in the various workshops and provided valuable subject matter expertise and lessons learned. The comments received from other government and industry organizations are also acknowledged. VERSION 0.1 i

412

Numerical Simulation Management  

Science Conference Proceedings (OSTI)

... API. A high level API is required for customizing the management process when the SMT requirements do not meet the researcher's needs. ...

2013-07-19T23:59:59.000Z

413

Management Information Reporting Procedures  

Science Conference Proceedings (OSTI)

... but are not limited to assistance in developing environmental management systems, improving ... with a client that is already in the database, there is ...

2010-07-01T23:59:59.000Z

414

THE PRESIDENT'S MANAGEMENT AGENDA  

NLE Websites -- All DOE Office Websites (Extended Search)

For example, * Workforce planning and restructuring undertaken as part of Strategic Management of Human Capital will be defined in terms of each agency's mission, goals, and...

415

Environmental Management Commission (Alabama)  

Energy.gov (U.S. Department of Energy (DOE))

The Alabama Department of Environmental Management is charged with developing the state's environmental policy, hearing administrative appeals of permits, administrative orders and variances issued...

416

Group key management  

SciTech Connect

This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

Dunigan, T.; Cao, C.

1997-08-01T23:59:59.000Z

417

Revolutionizing Software Asset Management  

Science Conference Proceedings (OSTI)

... Security Automation Minimize Risk Page 3. ... Update Software Distribution/ Management ... 4 Test Devices One system has base OS + MSIE 8.0 ...

2012-11-02T23:59:59.000Z

418

Nuclear Waste Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Waste Management's Yucca Mountain Project and the Office of Nuclear Energy's Advanced Fuel Cycle Initiative (AFCI) and Global Nuclear Energy Partnership (GNEP) programs. Efforts...

419

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... responsible to executive-level management (eg, the Chief Information Officer) for the ... entity information, keys, and metadata into a database used by ...

2013-08-15T23:59:59.000Z

420

Energy Management - TMS  

Science Conference Proceedings (OSTI)

TMS 2011: Lunchtime Session: Energy Management: Things Your Mother Didn't Teach You February 27 - March 3, 2011 San Diego, California. Anyone...

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Efficient Water Use & Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Sustainability Goals Water Use Goal 4: Efficient Water Use & Management Aware of the arid climate of northern New Mexico, water reduction and conservation remains a primary...

422

E M Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E M Environmental Management safety performance cleanup closure EM RECOVERY ACT TOP LINE MESSAGES * The Department estimates the 6 billion Recovery Act investment has allowed us...

423

Energy Management Systems  

E-Print Network (OSTI)

This presentation will address results from a pilot project with 10 chemical plants on energy management systems and the development of an energy efficiency plant certification program.

Ferland, K.

2007-01-01T23:59:59.000Z

424

GO MANAGERS OFFICE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

starch 12122007 15:50 303275497* GO MANAGERS OFFICE PAGE 0306 * * processing and dry corn fractionation and has developed numerous proprietary technologies in the field of...

425

Integrated waste management.  

E-Print Network (OSTI)

??Integrated waste management is considered from a systems approach, with a particular emphasis on advancing sustainability. The focus of the thesis is to examine the (more)

Seadon, Jeffrey Keith

2010-01-01T23:59:59.000Z

426

b. FINANCIAL MANAGEMENT POLICY  

Science Conference Proceedings (OSTI)

The TMS Financial Management Policy establishes the methods and guidelines by which the .... INVESTMENT POLICIES AND PROCEDURES. 5.1 The...

427

Office of Quality Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Data. To meet these missions, the Office of Quality Management: Develops and revises DOE Regulations and Orders concerning Restricted Data, Formerly Restricted Data,...

428

Stormwater Management Act (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

The policy and purpose of this act is to encourage planning and management of storm water runoff in each watershed consistent with sound water and land use practices.

429

Training Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Beam Time ESAF Contacts Calendars User Community Scientific Access Site AccessVisit Training Training Management System Argonne system used to track training requirements and...

430

The Role of the Consequence Management Home Team in the Fukushima Daiichi Response  

Science Conference Proceedings (OSTI)

The Consequence Management Home Team is a U.S. Department of Energy/National Nuclear Security Administration asset. It assists a variety of response organizations with modeling; radiological operations planning; field monitoring techniques; and the analysis, interpretation, and distribution of radiological data. These reach-back capabilities are activated quickly to support public safety and minimize the social and economic impact of a nuclear or radiological incident. In the Fukushima Daiichi response, the Consequence Management Home Team grew to include a more broad range of support than was historically planned. From the early days of the response to the continuing involvement in supporting late phase efforts, each stage of the Consequence Management Home Team support had distinct characteristics in terms of management of incoming data streams as well as creation of products. Regardless of stage, the Consequence Management Home Team played a critical role in the Fukushima Daiichi response effort.

Pemberton, W., Mena, R., Beal, W.

2012-05-01T23:59:59.000Z

431

Mixed Waste Management Guidelines  

Science Conference Proceedings (OSTI)

The management of mixed waste presents serious challenges to nuclear utilities. Regulatory and practical predicaments make compliance with the letter of all applicable regulations extremely difficult. Utility experts developed these guidelines to identify opportunities for improving work practices and regulatory compliance while minimizing any potential adverse impacts of mixed waste management.

1994-12-31T23:59:59.000Z

432

EPRI Tritium Management Model  

Science Conference Proceedings (OSTI)

While tritium generated by nuclear power plants has insignificant dose impacts to the public, its management can be a significant issue in terms of public relations and perception. This document provides a tool for nuclear power plant decision makers to assess their operating strategies for tritium management.

2005-11-10T23:59:59.000Z

433

Managing UX teams  

Science Conference Proceedings (OSTI)

This SIG will serve two purposes: as a forum to share the results from the two-day CHI workshop, and also as a forum for the management community to discuss topics of interest. Keywords: design, management, method, organizations, practice, research, technique, user experience

Janice Rohn; Dennis Wixon; Jim Nieters; Carola Thompson

2011-05-01T23:59:59.000Z

434

Lawn Water Management  

E-Print Network (OSTI)

Water is a limited resource in Texas. This booklet explains how homeowners can establish a water management program for a home lawn that both maintains a healthy sod and also conserves water. The publication discusses soil types, grass varieties, management practices and watering techniques.

McAfee, James

2006-06-26T23:59:59.000Z

435

Sustainable warehouse management  

Science Conference Proceedings (OSTI)

Sustainable warehouse is about integrating, balancing and managing the economic, environmental and social inputs and outputs of the warehouse operations. Sustainability is a core value to many businesses but they find it hard to implement in their current ... Keywords: sustainability modelling, sustainable warehouse management, system dynamics

Kah-Shien Tan; M. Daud Ahmed; David Sundaram

2009-06-01T23:59:59.000Z

436

Substation Stormwater Management  

Science Conference Proceedings (OSTI)

Electric substations have unique considerations in stormwater management due to the presence of high voltage lines and fluids that create contaminant concerns. In response to the changing regulatory climate, Electric Power Research Institute (EPRI) members identified a need to assess and develop stormwater management strategies to control discharges from electric substation construction sites.BackgroundStormwater regulation is becoming more stringent across ...

2013-11-21T23:59:59.000Z

437

Unfolding linac photon spectra and incident electron energies from experimental transmission data, with direct independent validation  

SciTech Connect

Purpose: In a recent computational study, an improved physics-based approach was proposed for unfolding linac photon spectra and incident electron energies from transmission data. In this approach, energy differentiation is improved by simultaneously using transmission data for multiple attenuators and detectors, and the unfolding robustness is improved by using a four-parameter functional form to describe the photon spectrum. The purpose of the current study is to validate this approach experimentally, and to demonstrate its application on a typical clinical linac. Methods: The validation makes use of the recent transmission measurements performed on the Vickers research linac of National Research Council Canada. For this linac, the photon spectra were previously measured using a NaI detector, and the incident electron parameters are independently known. The transmission data are for eight beams in the range 10-30 MV using thick Be, Al and Pb bremsstrahlung targets. To demonstrate the approach on a typical clinical linac, new measurements are performed on an Elekta Precise linac for 6, 10 and 25 MV beams. The different experimental setups are modeled using EGSnrc, with the newly added photonuclear attenuation included. Results: For the validation on the research linac, the 95% confidence bounds of the unfolded spectra fall within the noise of the NaI data. The unfolded spectra agree with the EGSnrc spectra (calculated using independently known electron parameters) with RMS energy fluence deviations of 4.5%. The accuracy of unfolding the incident electron energy is shown to be {approx}3%. A transmission cutoff of only 10% is suitable for accurate unfolding, provided that the other components of the proposed approach are implemented. For the demonstration on a clinical linac, the unfolded incident electron energies and their 68% confidence bounds for the 6, 10 and 25 MV beams are 6.1 {+-} 0.1, 9.3 {+-} 0.1, and 19.3 {+-} 0.2 MeV, respectively. The unfolded spectra for the clinical linac agree with the EGSnrc spectra (calculated using the unfolded electron energies) with RMS energy fluence deviations of 3.7%. The corresponding measured and EGSnrc-calculated transmission data agree within 1.5%, where the typical transmission measurement uncertainty on the clinical linac is 0.4% (not including the uncertainties on the incident electron parameters). Conclusions: The approach proposed in an earlier study for unfolding photon spectra and incident electron energies from transmission data is accurate and practical for clinical use.

Ali, E. S. M.; McEwen, M. R.; Rogers, D. W. O. [Carleton Laboratory for Radiotherapy Physics, Department of Physics, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario K1S 5B6 (Canada); Ionizing Radiation Standards, Institute for National Measurement Standards, National Research Council, M-35 Montreal Road, Ottawa, Ontario K1A 0R5 (Canada); Carleton Laboratory for Radiotherapy Physics, Department of Physics, Carleton University, 1125 Colonel By Drive, Ottawa, Ontario K1S 5B6 (Canada)

2012-11-15T23:59:59.000Z

438

Risk Management RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Risk Management Review Module Risk Management Review Module March 2010 CD-0 O 0 OFFICE OF C CD-1 F ENVIRO Standard R Risk M Rev Critical Decis CD-2 M ONMENTAL Review Plan Managem view Module sion (CD) Ap CD March 2010 L MANAGE (SRP) ment e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008, Integration of Safety into the Design Process, and EM's internal

439

Office of Legacy Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

December 1.7, 2010 December 1.7, 2010 MEMORANDUM FOR DAVID W. GEISER, DIRECTOR, DOE-LM- 1 FROM: TRACY A. RIBEIRO, ENVIRONMENTAL PROGRAM MANAGER, DOE-LM , f , ,,, Tracy R i b e ~ r o n / / 2010.1 2 17 08:47:34 -07'00' SUBJECT: Approval of FY 201 1 EMS Goals and Initiatives In accordance with the requirements of the DOE-LM Environmental Management System Description, the highlighted EMS goals and initiatives for FY 201 1 are enclosed for your formal approval. The EMS goals and initiatives align with DOE Order 450.1 A, Environmental Protection Program; DOE Order 430.2B, Departmental Energy, Renewable Energy and Transportation Management; the Transformational Energy Action Management (TEAM) Initiative, Executive Order 13423, Strengthening Federal Environmental, Energy and Transportation Management,

440

Terrestrial Carbon Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Terrestrial Carbon Management Data Sets and Analyses Terrestrial Carbon Management Data Sets and Analyses Carbon Accumulation with Cropland Management Influence of Agricultural Management on Soil Organic Carbon: A Compendium and Assessment of Canadian Studies (VandenBygaart et al., Agriculture and Agri-Food Canada) Soil Carbon Sequestration by Tillage and Crop Rotation: A Global Data Analysis (West and Post, Oak Ridge National Laboratory) Preliminary Estimates of the Potential for Carbon Mitigation in European Soils Through No-Till Farming (Smith et al., University of Aberdeen, United Kingdom) Potential for Carbon Sequestration in European Soils: Preliminary Estimates for Five Scenarios Using Results from Long-Term Experiments (Smith et al., University of Aberdeen, United Kingdom) Carbon Accumulation with Grassland Management

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Federal Energy Management Program: Best Management Practice: Laboratory and  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory and Medical Equipment to someone by E-mail Laboratory and Medical Equipment to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Google Bookmark Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Delicious Rank Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Laboratory and Medical Equipment on AddThis.com... Sustainable Buildings & Campuses

442

Federal Energy Management Program: Best Management Practice: Toilets and  

NLE Websites -- All DOE Office Websites (Extended Search)

Toilets and Urinals to someone by E-mail Toilets and Urinals to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Google Bookmark Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Delicious Rank Federal Energy Management Program: Best Management Practice: Toilets and Urinals on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Toilets and Urinals on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases Water Efficiency Basics

443

Best Management Practice: Water Management Planning | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Management Practice: Water Management Planning Best Management Practice: Water Management Planning Best Management Practice: Water Management Planning October 7, 2013 - 3:03pm Addthis A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans. Water management plans should provide clear information about how a facility uses water from the time it is piped in to its ultimate disposal. Knowing how water is used and what it costs enables Federal agencies to make appropriate water management decisions. Overview Federal facility water management plans should include the following: Water Use Policy Statement and Goals Senior management should indicate support for water efficiency in a material way. This can be done in two ways:

444

Records Management POC Responsibilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

RespbsforHQPOCSREDESIGN.pdf More Documents & Publications POINT OF CONTACT RESPONSIBILITIES FOR RECORDS MANAGEMENT Records Management Handbook Records Management Handbook...

445

Information and Records Management Transition Guidance | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information and Records Management Transition Guidance Information and Records Management Transition Guidance Information and Records Management Transition Guidance (March 2004)...

446

Automated Transportation Management System (ATMS) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Waste Management Packaging and Transportation Automated Transportation Management System (ATMS) Automated Transportation Management System (ATMS) The Department of Energy's...

447

Note: Grazing incidence small and wide angle x-ray scattering combined with imaging ellipsometry  

SciTech Connect

The combination of grazing incidence small angle x-ray scattering (GISAXS) and grazing incidence wide angle x-ray scattering (GIWAXS) with optical imaging ellipsometry is presented as an upgrade of the available measurement techniques at the wiggler beamline BW4 of the Hamburger Synchrotronstrahlungslabor. The instrument is introduced with the description of the alignment procedure to assure the measurement of imaging ellipsometry and GISAXS/GIWAXS on the same sample spot. To demonstrate the possibilities of the new instrument examples of morphological investigation on films made of poly(3-hexylthiophene) and [6,6]-phenyl-C{sub 61} butyric acid methyl ester as well as textured poly(9,9-dioctylfluorene-alt-benzo-thia-diazole) are shown.

Koerstgens, V.; Meier, R.; Ruderer, M. A.; Guo, S.; Chiang, H.-Y.; Mueller-Buschbaum, P. [Technische Universitaet Muenchen, Physik-Department, Lehrstuhl fuer Funktionelle Materialien, James-Franck-Str. 1, 85748 Garching (Germany); Perlich, J.; Roth, S. V.; Gehrke, R. [HASYLAB, DESY, Notkestr. 85, 22607, Hamburg (Germany)

2012-07-15T23:59:59.000Z

448

Appendix 8 - iManage Change Management Standards  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Date: Robert Regan CHRISePerformance Project Manager Signature: Date: Matthew Sparks STRIPES Project Manager Signature: Date: Distribution This document has been distributed to:...

449

Federal Energy Management Program: DOE Enhances Management of...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Renewable Energy Federal Energy Management Program DOE Enhances Management of Energy Savings Performance Contracts U.S. Department of Energy (DOE) Assistant Secretary...

450

Incident-energy and system-size dependence of directed flow  

E-Print Network (OSTI)

We present STAR's measurements of directed flow for charged hadrons in Au+Au and Cu+Cu collisions at $\\sqrt{s_\\mathrm{NN}} = 200$ GeV and 62.4 GeV, as a function of pseudorapidity, transverse momentum and centrality. We find that directed flow depends on the incident energy, but not on the system size. We extend the validity of limiting fragmentation hypothesis to different collision systems.

Gang Wang

2007-01-23T23:59:59.000Z

451

Arc Flash Issues in Transmission and Substation Environments: Modeling of Incident Thermal Energy of Long Arcs  

Science Conference Proceedings (OSTI)

Arc flashes are a serious hazard that may put people in life-threatening situations and cause great damage to existing assets. The National Electrical Safety Code (NESC) and the Occupational Safety and Health Administration (OSHA) introduced requirements for electric utilities to perform arc flash hazard assessment of their facilities operating at and above 1000 V. Most methods available at this time for analyzing the incident thermal energy of arc flash were developed for low and medium-voltage industri...

2011-12-20T23:59:59.000Z

452

Establishing Tower-Top Equipotential Zones--Case-Study of Incidents  

Science Conference Proceedings (OSTI)

The Occupational Safety and Health Administration (OSHA) requires employers to provide protection and training for workers who perform work on de-energized and energized lines. This Technical Update report contains the draft script of a new training video on DVD under development on establishing tower-top equipotential zones. The script contains case studies and analysis of specific selected incidents that have occurred in the field. It also includes recommendations for minimizing risks and avoiding elec...

2008-11-30T23:59:59.000Z

453

Comparative analysis of hydrogen fire and explosion incidents: quarterly report No. 2, December 1, 1977--February 28, 1978  

DOE Green Energy (OSTI)

Additional hydrogen incident reports compiled during this quarter have increased the size of the computerized data base to a current total of 280 incidents. Listings of 165 incidents that have occurred in industrial and transportation operations since 1968 are presented here. Sample case histories in six different cause categories are provided together with a discussion of common safety problems contributing to these incidents. Some of these problems are inadequate detection measures for hydrogen leaks and fires and ineffective purging with inert gas. A preliminary comparison of losses due to natural gas fires/explosions and hydrogen incidents indicates that hydrogen explosions have been, on the average, four-to-six times as damaging as natural gas explosions. Some tentative explanations for this result are presented but await confirmation from a more sophisticated statistical analysis.

Zalosh, R.G.; Short, T.P.

1978-03-01T23:59:59.000Z

454

Site Management Guide | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home Site Management Guide Site Management Guide Site Management Guide (Blue Book) (Revision 14, December 2012) Site Management Guide More Documents & Publications...

455

Risk Management Process Overview | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cybersecurity Risk Management Process Risk Management Process Overview Risk Management Process Overview figure depicting three tier risk management process The cybersecurity...

456

College of Environmental Management | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management College of Environmental Management College of Environmental Management Mission The College of Environmental Management (CEM) mission is to provide EM...

457

Procurement and Property Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Doing Business with... Doing Business with... Brookhaven National Laboratory (BNL) Procurement and Property Management provides customers with timely, cost-effective procurement and property management services integrated with and supporting the Laboratory's science, technology and cleanup missions in accordance with the prime contract and customer expectations. Services Include: Procurement of high quality supplies and services that meet customer requirements, Identification and control of government property, Maintaining an efficient stores operation, Expeditious shipping, receiving and delivery services. PPM Has Moved! We are located at: 44 Ramsey Road Shirley, NY 11967 Directions Procurement Property Management Purchasing System Approval (pdf) Personal Property Approval (pdf)

458

Risk Management Tool Attributes:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- Tools & SMEs - Tools & SMEs Outline for Breakout Session TOOLS 1. Types of Tools a. Risk Management - Database & Reports, risk register, risk forms, risk tracking & monitoring, basis of estimate, action item tracking, historical record of risks & changes, configuration control, enterprise-wide, metrics, risk performance index, risk checklist, graphical display, management reporting (various levels), risk communications b. Risk Analysis i. Cost, ii. budgets, funding, cash-flow analysis, iii. Schedule iv. tailoring categories v. Integrated Cost & Schedule vi. Project phase analysis; organization ownership & joint planning c. Risk Knowledge and Lessons Learned Database i. Enterprise-wide ii. Job/owner-specific iii. Workshops - project specific, risk management,

459

Performance Management Plan  

SciTech Connect

This Performance Management Plan describes the approach for accelerating cleanup activities of U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Operations Office (NNSA/NV) Environmental Management (EM) Program. This approach accelerates the reduction of risk at NNSA/NV sites while performing the work responsibly, effectively, and more efficiently. In May 2002, NNSA/NV EM and the Nevada Division of Environmental Protection signed a Letter of Intent formalizing an agreement to pursue accelerated risk reduction and cleanup for activities within the State of Nevada. This Performance Management Plan provides the strategic direction for implementing the Letter of Intent.

IT Corporation, Las Vegas, NV

2002-08-21T23:59:59.000Z

460

Federal Energy Management Program: Best Management Practice: Distribution  

NLE Websites -- All DOE Office Websites (Extended Search)

Distribution System Audits, Leak Detection, and Repair to someone Distribution System Audits, Leak Detection, and Repair to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Google Bookmark Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Delicious Rank Federal Energy Management Program: Best Management Practice: Distribution System Audits, Leak Detection, and Repair on Digg Find More places to share Federal Energy Management Program: Best

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Federal Energy Management Program: Metering  

NLE Websites -- All DOE Office Websites (Extended Search)

Metering to Metering to someone by E-mail Share Federal Energy Management Program: Metering on Facebook Tweet about Federal Energy Management Program: Metering on Twitter Bookmark Federal Energy Management Program: Metering on Google Bookmark Federal Energy Management Program: Metering on Delicious Rank Federal Energy Management Program: Metering on Digg Find More places to share Federal Energy Management Program: Metering on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management Commissioning Metering Systems Approaches Process Computerized Maintenance Management Systems Maintenance Types Major Equipment Types Resources Contacts Greenhouse Gases Water Efficiency Data Center Energy Efficiency Industrial Facilities

462

DOE Office of Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Management Environmental Management Project and Contract Management Improvement Timeline Improving DOE contract and project management is a top priority of the Department's senior management and entire organization. The DOE Office of Environmental Management (EM) has put in place a "Roadmap" for Journey to Excellence that sets specific performance expectations for continuous improvements in contract and project management. Following are some highlights of EM's improvement actions over the past five years. In 2006, the National Academy of Public Administration (NAPA) began a study of EM, which included acquisition and project management among its key focus areas. The resultant report from the study,

463

Cryptographic Key Management Workshop 2012  

Science Conference Proceedings (OSTI)

Cryptographic Key Management Workshop 2012. Purpose: NIST is conducting a two-day Key Management Workshop on September 10-11. ...

2013-08-01T23:59:59.000Z

464

Vencon Management | Open Energy Information  

Open Energy Info (EERE)

| Sign Up Search Page Edit with form History Facebook icon Twitter icon Vencon Management Jump to: navigation, search Name Vencon Management Place United States Sector...

465

Email in personal information management  

Science Conference Proceedings (OSTI)

Email's conduit function means the inbox, folders, search, and sort are used to support core PIM functions of task management, personal archiving, and contact management.

Steve Whittaker; Victoria Bellotti; Jacek Gwizdka

2006-01-01T23:59:59.000Z

466

Drilling Waste Management Technology Descriptions  

NLE Websites -- All DOE Office Websites (Extended Search)

skip navigation Drilling Waste Management Information System: The information resource for better management of drilling wastes DWM Logo Search Search you are in this section...

467

NIM (NERSC Information Management) system  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information....

468

Engage upper management | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify...

469

Federal Energy Management Program: Publications  

NLE Websites -- All DOE Office Websites (Extended Search)

that about 10% of this is used to heat Details Bookmark & Share View Related Federal Energy Management Program Overview - Facilitating Sound, Cost-Effective Energy Management...

470

Industrial energy management | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify...

471

Federal Energy Management Program: Technologies  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies Site Map Printable Version Share this resource Send a link to Federal Energy Management Program: Technologies to someone by E-mail Share Federal Energy Management...

472

Federal Energy Management Program: Outreach  

NLE Websites -- All DOE Office Websites (Extended Search)

Outreach to someone by E-mail Share Federal Energy Management Program: Outreach on Facebook Tweet about Federal Energy Management Program: Outreach on Twitter Bookmark Federal...

473

Jennifer Caldwell Senior Commercialization Manager  

NLE Websites -- All DOE Office Websites (Extended Search)

Caldwell, 865-574-4180, caldwelljt@ornl.gov Jennifer Caldwell Senior Commercialization Manager Jennifer Caldwell is a Senior Commercialization Manager for the Partnerships...

474

Federal Energy Management Program: Commissioning  

NLE Websites -- All DOE Office Websites (Extended Search)

Commissioning to someone by E-mail Share Federal Energy Management Program: Commissioning on Facebook Tweet about Federal Energy Management Program: Commissioning on Twitter...

475

Management Excellence by Sandra Waisley  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

cleanup closure E M Environmental Management 2 EM Journey to Excellence Roadmap DOE Strategic Plan (2011) (Goal: Management and Operational Excellence) Performance Agreement...

476

Drilling Waste Management Information System  

NLE Websites -- All DOE Office Websites (Extended Search)

The Drilling Waste Management Information System is an online resource for technical and regulatory information on practices for managing drilling muds and cuttings, including...

477

Managing Radiation Emergencies: Prehospital Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance for Prehospital Emergency Services Guidance for Hospital Medical Management Procedure Demonstration How do you manage emergencies? Guidance for Prehospital Emergency...

478

Lab hosts multi-lab cyber security games  

NLE Websites -- All DOE Office Websites (Extended Search)

Joint Cyber Coordination Center, or JC3. The JC3 is focused on improving the national response to threats, leveraging complex resources, and sharing information to meet...

479

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fourth Quarter Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Final FY 2012 Pre- & Post-CAP Final Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 86% Construction 87% Cleanup 84% 77% Pre-CAP 89% Post-CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 4th Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 100% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

480

Government Energy Management  

Energy.gov (U.S. Department of Energy (DOE))

The U.S. Department of Energy's Federal Energy Management Program (FEMP) plays a critical role in reducing energy use and increasing the use of renewable energy at federal agencies. The U.S....

Note: This page contains sample records for the topic "incident management jc3" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

First Quarter First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 84% Construction 83% Cleanup 85% 77% Pre-CAP 86% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 1st Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 94% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

482

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Second Quarter Second Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 Contract/Project Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90% of capital asset projects at original scope and within 110% of CD-2 TPC. 90%* 88% Construction 87% Cleanup 89% 77% Pre-CAP 92% Post- CAP This is based on a 3- year rolling average (FY10 to FY12). TPC is Total Project Cost. Contract/Project Management Performance Metrics FY 2012 Target FY 2012 2nd Qtr Actual Comment Certified EVM Systems: Post CD-3, (greater than $20 million). 95%* 96% EVM represents Earned Value Management. Certified FPD's at CD-1: Projects

483

Supplier Selection Management Process  

NLE Websites -- All DOE Office Websites (Extended Search)

ADMP-002 Vendor Selection and Management Process 11_0203 1 of 9 ADMP-002 Vendor Selection and Management Process 11_0203 1 of 9 EOTA - Business Process Document Title: Vendor Selection and Management Process Document Number: ADMP-002 Rev. 11_0203 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): ADMF-009 Vendor Audit Plan, ADMF-010 Vendor Audit Checklist, ADMF-011 Vendor Audit Report, ADMF-015 Vendor Evaluation Record, ADMP-001 Procurement Process, ADMF-016 EOTA Vendor List, REG-003 Record Register ADMP-002 Vendor Selection and Management Process 11_0203 2 of 9 Revision History: Rev. Description of Change A Initial Release 08_1110 Added verbiage and reference for ADMF-016, EOTA Vendor List to process.

484

Integrating Management Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Mission Execution by Mission Execution by Integrating our Management Systems Integrating our Management Systems 1 W e e k l y O p e r a t i o n s M e e t i n g N o v e m b e r 1 , 2 0 1 1 M i c h a e l J . W e i s Pulling the Pieces Together for Improving DOE Management to Enable Mission Execution 2  Process changes Process changes  Behavioral changes Behavioral changes  System changes System changes Process Change Approach Strengthening and Expediting Decision Making 3 Proposed Outcomes Horizontal Integration Incoming DOE Business Crosscutting Issues (i.e. NLDC input) Hi-level Roadblocks Operations Management Council Associate Deputy Secretary Collaborative Action Process Chief Operating Officer Weekly Operations Council (OMC) Super 8 Secretary (ADS) (CAP) Board (COOB) p Meeting Endorsement / Commitment Super 8 US Meetings COO Meetings

485

Safety Management System Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

POLICY POLICY Washington, D.C. Approved: 4-25-11 SUBJECT: INTEGRATED SAFETY MANAGEMENT POLICY PURPOSE AND SCOPE To establish the Department of Energy's (DOE) expectation for safety, 1 including integrated safety management that will enable the Department's mission goals to be accomplished efficiently while ensuring safe operations at all departmental facilities and activities. This Policy cancels and supersedes DOE Policy (P) 411.1, Safety Management Functions, Responsibilities, and Authorities Policy, dated 1-28-97; DOE P 441.1, DOE Radiological Health and Safety Policy, dated 4-26-96; DOE P 450.2A, Identifying, Implementing and Complying with Environment, Safety and Health Requirements, dated 5-15-96; DOE P 450.4, Safety Management

486

Transportation Management Workshop: Proceedings  

Science Conference Proceedings (OSTI)

This report is a compilation of discussions presented at the Transportation Management Workshop held in Gaithersburg, Maryland. Topics include waste packaging, personnel training, robotics, transportation routing, certification, containers, and waste classification.

Not Available

1993-10-01T23:59:59.000Z

487

COMPREHENSIVE LEGACY MANAGEMENT  

Office of Legacy Management (LM)

Revision 7.0 Final This page intentionally left blank LMSFERS03496-7.0 Comprehensive Legacy Management and Institutional Controls Plan Volumes I and II Fernald Preserve Fernald,...

488

BNL Environmental Management Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Surface Projects Brookhaven Graphite Research Reactor High Flux Beam Reactor Waste Management Division OU IV Five-Year Review The five-year review of the Operable Unit IV...

489

Uranium Management and Policy  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Uranium Management and Policy (NE-54), as part of the Office of Fuel Cycle Technologies (NE-5), supports the Department of Energy (DOE) by assuring domestic supplies of fuel for...

490

Manage Software Testing  

Science Conference Proceedings (OSTI)

Covering all aspects of test management, this book guides you through the business and organizational issues that you are confronted with on a daily basis, and explains what you need to focus on strategically, tactically, and operationally.

Peter Farrell-Vinay

2007-07-01T23:59:59.000Z

491

Management Control Cover  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fees in the Idaho National Laboratory Contract OAS-M-06-07 August 2006 REPORT ON MANAGEMENT CONTROLS OVER PERFORMANCE FEES IN THE IDAHO NATIONAL LABORATORY CONTRACT TABLE OF...

492

External > Programs > Environmental Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Haul Road Environmental Management The Oak Ridge Reservation is one of the U.S. Department of Energy's (DOE) most unique and complex sites, encompassing three major campuses and...

493

Integrated XML Document Management  

Science Conference Proceedings (OSTI)

XML has become a widely accepted data format for exchange and representation of semi-structured data. Efficiently managing XML as well as traditional business documents and content in an integrated fashion is a necessity for companies to be successful ...

Hui-I Hsiao; Joshua Hui; Ning Li; Parag Tijare

2003-01-01T23:59:59.000Z

494

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 Forecast FY 2011 Pre- & Post-CAP Forecast Comment 1a. Capital Asset Line Item Projects:...

495

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast FY 2012 Pre- & Post-CAP Forecast Comment Capital Asset Project Success: Complete 90%...

496

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Management Primary Performance Metrics FY 2011 Target FY 2011 Actual & Forecast FY 2011 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCACAP)...

497

Contract/Project Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY 2010 Pre- & Post-CAP Comment 1a. Capital Asset Line Item Projects: (Pre-RCACAP)...

498

ISSUES MANAGEMENT PROGRAM MANUAL  

E-Print Network (OSTI)

ISSUES MANAGEMENT PROGRAM MANUAL LBNL/PUB-5519 (1), Rev. 0and Analysis Program Manual. LBNL/PUB-5519 (1), Rev. 0the Regulations and Procedures Manual (RPM): CATS database o

Gravois, Melanie

2007-01-01T23:59:59.000Z

499

Waste Management Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Waste Management Facility ISO 14001 Registered A wide range of wastes are generated during the normal course of business at BNL. These waste streams are common to many businesses...

500

Environmental Management System Plan  

E-Print Network (OSTI)

Protection Program, DOE Order 450.1A (June 4, 3. DOE Oand Health Reporting, DOE Order 231.1A (1995, as amended).Emergency Management System, DOE Order 151.1B (October 29,

Fox, Robert

2009-01-01T23:59:59.000Z