National Library of Energy BETA

Sample records for management vulnerability assessment

  1. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor

  2. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  3. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  4. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  5. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  6. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  7. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  8. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  9. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  10. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  11. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  12. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  13. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  14. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  15. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management ...

  16. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  17. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  18. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  19. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection

  20. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  1. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  2. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

  3. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04

    Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release

  4. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  5. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  6. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  7. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  8. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  9. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  10. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  11. Enterprise Assessments Emergency Management Assessment of the...

    Office of Environmental Management (EM)

    Emergency Management Assessment of the Waste Isolation Pilot Plant - April 2016 Enterprise Assessments Emergency Management Assessment of the Waste Isolation Pilot Plant - April ...

  12. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

  13. Risk Assessment & Management Information

    Broader source: Energy.gov [DOE]

    NRC - A Proposed Risk Management Regulatory Framework, April 2012 Risk Assessment Technical Experts Working Group (RWG) web page DOE Standard on Development and Use of Probabilistic Risk Assessment in DOE Nuclear Safety Applications (draft), December 2010 Consortium for Risk Evaluation with Stakeholder Participation Workshop on Risk Assessment and Safety Decision Making Under Uncertainty

  14. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered ... Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  15. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  16. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  17. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC)

  18. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  19. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  20. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Broader source: Energy.gov [DOE]

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  1. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  2. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  3. Quality Procedure - Management Assessment and Self-Assessment | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Management Assessment and Self-Assessment Quality Procedure - Management Assessment and Self-Assessment This procedure establishes the roles, responsibilities, requirements, and process for conducting Environmental Management (EM) Office of Standards and Quality Assurance management assessments and self-assessments. Effective management assessments and self-assessments are built on self-evaluation, work process analysis, clear communication with management, and honest feedback that

  4. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  5. INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER...

    Office of Scientific and Technical Information (OSTI)

    INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER AND WASTEWATER AT THE ... Title: INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER AND WASTEWATER AT THE ...

  6. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  7. Office of Project Management Oversight & Assessments | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Office of Project Management Oversight & Assessments Career Development Project Management Career Development Program (DOE Only) Acquisition Career Management Program (DOE Only)...

  8. Enterprise Assessments Emergency Management Assessment of the Waste

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Isolation Pilot Plant - April 2016 | Department of Energy Emergency Management Assessment of the Waste Isolation Pilot Plant - April 2016 Enterprise Assessments Emergency Management Assessment of the Waste Isolation Pilot Plant - April 2016 April 2016 Emergency Management Assessment of the Waste Isolation Pilot Plant - April 2016 The Office of Emergency Management Assessments, within the U.S. Department of Energy (DOE) independent Office of Enterprise Assessments (EA), conducted an

  9. CRAD, Configuration Management Assessment Plan

    Broader source: Energy.gov [DOE]

    The objective of this assessment is to determine whether a Configuration Management Program (CM) is in place which allows for the availability and retrievability of accurate information, improves response to design and operational decisions, enhances worker safety, increases facility safety and reliability, increases efficiency of work efforts, and helps maintain integrity of interfacing orders.

  10. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    SciTech Connect (OSTI)

    Vogel, J.; O'Grady, M.; Renfrow, S.

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  11. Risk Assessment/Management Tool

    Energy Science and Technology Software Center (OSTI)

    2010-12-31

    RAMTool performs the following: • A tool to perform facility and programmatic risk assessments, produce risk registers, develop risk management plans (RMPs), link risks to improvement/risk-reduction projects, and actively manage risks • Ability to conduct risk assessments. Ease of determination of probability and consequence based on industry standard risk matrices. Complies with site risk management performance document. Provides multiple outputs/report for required risk forms. Conduct quick risk data analysis. • Performs/calculates a facility risk factormore » (RF) and a programmatic RF. Supports project and initiative prioritization and funding in order to make solid decisions on risk reduction. Assigns responsibility and accountability at a risk owner (RO) level. Monitors and tracks progress toward completing mitigation strategies. Ability to import massive amounts of data at the push of a button. Integrates development of a Risk Management Plan (RMP) Built for ease-of-use – design, built, and used by technical/management personnel. Can be customized (functions and/or reports) for further analysis« less

  12. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities

    SciTech Connect (OSTI)

    Wilkey, D.D.

    1995-09-01

    This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

  13. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  14. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  15. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  16. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  17. Next-generation Algorithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience

    SciTech Connect (OSTI)

    Burchett, Deon L.; Chen, Richard Li-Yang; Phillips, Cynthia A.; Richard, Jean-Philippe

    2015-05-01

    This report summarizes the work performed under the project project Next-Generation Algo- rithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience. The goal of the project was to improve mathematical programming-based optimization technology for in- frastructure protection. In general, the owner of a network wishes to design a network a network that can perform well when certain transportation channels are inhibited (e.g. destroyed) by an adversary. These are typically bi-level problems where the owner designs a system, an adversary optimally attacks it, and then the owner can recover by optimally using the remaining network. This project funded three years of Deon Burchett's graduate research. Deon's graduate advisor, Professor Jean-Philippe Richard, and his Sandia advisors, Richard Chen and Cynthia Phillips, supported Deon on other funds or volunteer time. This report is, therefore. essentially a replication of the Ph.D. dissertation it funded [12] in a format required for project documentation. The thesis had some general polyhedral research. This is the study of the structure of the feasi- ble region of mathematical programs, such as integer programs. For example, an integer program optimizes a linear objective function subject to linear constraints, and (nonlinear) integrality con- straints on the variables. The feasible region without the integrality constraints is a convex polygon. Careful study of additional valid constraints can significantly improve computational performance. Here is the abstract from the dissertation: We perform a polyhedral study of a multi-commodity generalization of variable upper bound flow models. In particular, we establish some relations between facets of single- and multi- commodity models. We then introduce a new family of inequalities, which generalizes traditional flow cover inequalities to the multi-commodity context. We present encouraging numerical results. We also consider the directed edge

  18. Enterprise Assessments Review of Radioactive Waste Management...

    Energy Savers [EERE]

    Gaseous Diffusion Plant - December 2015 Enterprise Assessments Review of Radioactive Waste Management at the Portsmouth Gaseous Diffusion Plant - December 2015 December ...

  19. Management Assessment and Independent Assessment Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-31

    The revision to this Guide reflects current assessment practices, international standards, and changes in the Department of Energy expectations. Cancels DOE G 414.1-1. Canceled by DOE G 414.1-1B.

  20. Manager's Signature Log Privacy Impact Assessment, Office of...

    Office of Environmental Management (EM)

    Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's ...

  1. Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Federick T.; Schlicher, Bob G

    2015-01-01

    There are many influencing economic factors to weigh from the defender-practitioner stakeholder point-of-view that involve cost combined with development/deployment models. Some examples include the cost of countermeasures themselves, the cost of training and the cost of maintenance. Meanwhile, we must better anticipate the total cost from a compromise. The return on investment in countermeasures is essentially impact costs (i.e., the costs from violating availability, integrity and confidentiality / privacy requirements). The natural question arises about choosing the main risks that must be mitigated/controlled and monitored in deciding where to focus security investments. To answer this question, we have investigated the cost/benefits to the attacker/defender to better estimate risk exposure. In doing so, it s important to develop a sound basis for estimating the factors that derive risk exposure, such as likelihood that a threat will emerge and whether it will be thwarted. This impact assessment framework can provide key information for ranking cybersecurity threats and managing risk.

  2. Management and Independent Assessments Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-03-27

    The Guide reflects updated standards for assessment practices, international standards, and changes in DOE expectations related to quality assurance (QA). Supersedes DOE G 414.1-1B.

  3. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  4. V-094: IBM Multiple Products Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple ...

  5. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  6. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  7. Assessing waste management systems using reginalt software

    SciTech Connect (OSTI)

    Meshkov, N.K.; Camasta, S.F.; Gilbert, T.L.

    1988-03-01

    A method for assessing management systems for low-level radioactive waste is being developed for US Department of Energy. The method is based on benefit-cost-risk analysis. Waste management is broken down into its component steps, which are generation, treatment, packaging, storage, transportation, and disposal. Several different alternatives available for each waste management step are described. A particular waste management system consists of a feasible combination of alternatives for each step. Selecting an optimal waste management system would generally proceed as follows: (1) qualitative considerations are used to narrow down the choice of waste management system alternatives to a manageable number; (2) the costs and risks for each of these system alternatives are evaluated; (3) the number of alternatives is further reduced by eliminating alternatives with similar risks but higher costs, or those with similar costs but higher risks; (4) a trade-off factor between cost and risk is chosen and used to compute the objective function (sum of the cost and risk); and (5) the selection of the optimal waste management system among the remaining alternatives is made by choosing the alternative with the smallest value for the objective function. The authors propose that the REGINALT software system, developed by EG and G Idaho, Inc., as an acid for managers of low-level commerical waste, be augmented for application to the managment of DOE-generated waste. Specific recommendations for modification of the REGINALT system are made. 51 refs., 3 figs., 2 tabs.

  8. Assessing the Labor-Management Relationship

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Labor-Management Relationship This report contains results and analysis of a survey that was issued to labor-management relations (LMR) personnel among all organizations/unions at the U.S. Department of Energy during August 2013. The goal of the survey is to assess the overall perceived effectiveness of LMR programs and to find potential target areas for improvement. The survey is comprised of 19 questions. Of these, 12 are subjective with the multiple choice answers: Strongly Agree, Agree,

  9. Enterprise Assessments Lessons Learned from the 2015 Emergency Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments - May 2016 | Department of Energy from the 2015 Emergency Management Assessments - May 2016 Enterprise Assessments Lessons Learned from the 2015 Emergency Management Assessments - May 2016 June 2016 Lessons Learned from the 2015 Emergency Management Assessments The Office of Emergency Management Assessments, within the Office of Enterprise Assessments (EA), evaluates specific areas of interest at U.S. Department of Energy (DOE) facilities. EA based this report on an overview of

  10. Office of Emergency Management Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Emergency Management Assessments Office of Emergency Management Assessments MISSION The Office of Emergency Management Assessments conducts assessments to provide critical feedback and objective information on emergency management programs and performance. This information provides assurance to our stakeholders and identifies areas for improvement to our leadership to support the safe performance of the Department's mission. FUNCTIONS Conducts oversight of the adequacy of DOE emergency

  11. Enterprise Assessments Lessons Learned from the 2015 Emergency Management Assessments … May 2016

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from the 2015 Emergency Management Assessments May 2016 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ..................................................................................................................................................... ii Executive Summary

  12. The Environmental Assessment Management modification of CADET

    Energy Science and Technology Software Center (OSTI)

    1996-05-01

    The original CADET system (finalized in September 1995 as version 1.3) is a data collection and transfer system developed for the Headquarters Air Force Space Command (HQAFSPC) Environmental Compliance Assessment and Management Program (ECAMP). The system was designed as a tool for ECAMP evaluators to use to enter compliance related data while in the field and to subsequently store, modify, sort, query, and print the data and to electronically transfer the data into the Airmore » Force''s Work Information Management System Environmental Subsystem (WIMSES). The original CADET system was designed to match the database structure of the WIMSES ECAMP module that came on-line in 1992. In June 1995, the Department of Defense issued The Environmental Assessment Management (TEAM) Guide and ECAMP Supplement to the TEAM Guide. These included changes to the type and amount of data collected during an ECAMP assessment. The WIMSES database structure was not modified to match the TEAM Guide; however, the need for collecting and storing the ECAMP data remained. The HQAFSC decided to modify the CADET system to incorporate the changes specified in the ECAMP Supplement and to convert the system from simply a data entry and transfer tool to a data entry and storage system to manage ECAMP findings in lieu of the WIMSES ECAMP module. The revised software is designated as version 2.0 and nicknamed TEAM CADET to distinguish it from the original CADET system.« less

  13. Cryptographic Key Management and Critical Risk Assessment

    SciTech Connect (OSTI)

    Abercrombie, Robert K

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  14. Enterprise Assessments, Lessons Learned from the 2014 Emergency Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reviews - April 2015 | Department of Energy the 2014 Emergency Management Reviews - April 2015 Enterprise Assessments, Lessons Learned from the 2014 Emergency Management Reviews - April 2015 April 2015 Lessons Learned from the 2014 Emergency Management Reviews The Office of Emergency Management Assessments, within the U.S. Department of Energy's independent Office of Enterprise Assessments (EA), Office of Environment, Safety and Health Assessments, conducted emergency management reviews at

  15. Manager's Signature Log Privacy Impact Assessment, Office of Science

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Chicago Office | Department of Energy Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office (110.12 KB) More Documents & Publications Integrated Safety Management Workshop Registration, PIA, Idaho National

  16. Enterprise Assessments Review of the Pantex Plant Emergency Management...

    Office of Environmental Management (EM)

    the Pantex Plant Emergency Management Exercise Program - November 2015 Enterprise Assessments Review of the Pantex Plant Emergency Management Exercise Program - November 2015 ...

  17. NDE to Manage Atmospheric SCC in Canisters for Dry Storage of Spent Fuel: An Assessment

    SciTech Connect (OSTI)

    Meyer, Ryan M.; Pardini, Allan F.; Cuta, Judith M.; Adkins, Harold E.; Casella, Andrew M.; Qiao, Hong; Larche, Michael R.; Diaz, Aaron A.; Doctor, Steven R.

    2013-09-01

    This report documents efforts to assess representative horizontal (Transuclear NUHOMS®) and vertical (Holtec HI-STORM) storage systems for the implementation of non-destructive examination (NDE) methods or techniques to manage atmospheric stress corrosion cracking (SCC) in canisters for dry storage of used nuclear fuel. The assessment is conducted by assessing accessibility and deployment, environmental compatibility, and applicability of NDE methods. A recommendation of this assessment is to focus on bulk ultrasonic and eddy current techniques for direct canister monitoring of atmospheric SCC. This assessment also highlights canister regions that may be most vulnerable to atmospheric SCC to guide the use of bulk ultrasonic and eddy current examinations. An assessment of accessibility also identifies canister regions that are easiest and more difficult to access through the ventilation paths of the concrete shielding modules. A conceivable sampling strategy for canister inspections is to sample only the easiest to access portions of vulnerable regions. There are aspects to performing an NDE inspection of dry canister storage system (DCSS) canisters for atmospheric SCC that have not been addressed in previous performance studies. These aspects provide the basis for recommendations of future efforts to determine the capability and performance of eddy current and bulk ultrasonic examinations for atmospheric SCC in DCSS canisters. Finally, other important areas of investigation are identified including the development of instrumented surveillance specimens to identify when conditions are conducive for atmospheric SCC, characterization of atmospheric SCC morphology, and an assessment of air flow patterns over canister surfaces and their influence on chloride deposition.

  18. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

  19. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... to increase power grid reliability and resilience, but also provides adversaries with the ... in industrial control systems for electricity generationtransmissiondistribution ...

  20. Bonneville - Hood River Vegetation Management Environmental Assessment

    SciTech Connect (OSTI)

    N /A

    1998-08-01

    To maintain the reliability of its electrical system, BPA, in cooperation with the U.S. Forest Service, needs to expand the range of vegetation management options used to clear unwanted vegetation on about 20 miles of BPA transmission line right-of-way between Bonneville Dam and Hood River; Oregon, within the Columbia Gorge National Scenic Area (NSA). We propose to continue controlling undesirable vegetation using a program of Integrated Vegetation Management (IVM) which includes manual, biological and chemical treatment methods. BPA has prepared an Environmental Assessment (EA) (DOE/EA-1257) evaluating the proposed project. Based on the analysis in the EA, BPA has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an Environmental Impact Statement (EIS) is not required and BPA is issuing this FONSI.

  1. Radioactive Waste Management Complex performance assessment: Draft

    SciTech Connect (OSTI)

    Case, M.J.; Maheras, S.J.; McKenzie-Carter, M.A.; Sussman, M.E.; Voilleque, P.

    1990-06-01

    A radiological performance assessment of the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory was conducted to demonstrate compliance with appropriate radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the general public. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the general public via air, ground water, and food chain pathways. Projections of doses were made for both offsite receptors and individuals intruding onto the site after closure. In addition, uncertainty analyses were performed. Results of calculations made using nominal data indicate that the radiological doses will be below appropriate radiological criteria throughout operations and after closure of the facility. Recommendations were made for future performance assessment calculations.

  2. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    SciTech Connect (OSTI)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energy’s National Energy Technology Laboratory, the Blowout and Spill Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.

  3. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energy’s National Energy Technology Laboratory, the Blowout and Spillmore » Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.« less

  4. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    SciTech Connect (OSTI)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energys National Energy Technology Laboratory, the Blowout and Spill Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.

  5. Office of Project Management Oversight & Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Project Management Oversight & Assessments 2015 Project Management Award Winners 2015 Project Management Award Winners The annual DOE Project Management Workshop provides an opportunity to recognize and reward excellence in project management across the complex. This Year, the Department recognized eight (8) individual and team successes in project management. Award presentations were made by Elizabeth Sherwood-Randall, Deputy Secretary of Energy. Read more FPD Resource Center FPD

  6. DOE's New Checklist Helps Plants Assess Energy Management Activities

    Broader source: Energy.gov [DOE]

    DOE developed the Strategic Energy Management Checklist to help manufacturing facilities conduct a high-level assessment of their energy management practices and identify opportunities to achieve greater energy savings.

  7. Assessing the Labor-Management Relationship

    Office of Environmental Management (EM)

    ... CBA..." "Everyone seems to be working in secret." "Feels like they got together and ... to discipline lower level management...". "Top management can't even get their own ...

  8. Independent Oversight Assessment, DOE Office of Environmental Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Headquarters - November 2012 | Department of Energy DOE Office of Environmental Management Headquarters - November 2012 Independent Oversight Assessment, DOE Office of Environmental Management Headquarters - November 2012 November 2012 Assessment of Safety Culture at the U.S. Department of Energy Office of Environmental Management Headquarters This report provides the results of an independent assessment of the safety culture at the Department of Energy's (DOE) Office of Environmental

  9. Enterprise Assessments Emergency Management Assessment of the Waste Isolation Pilot Plant … April 2016

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Emergency Management Assessment of the Waste Isolation Pilot Plant April 2016 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  10. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  11. Office of Emergency Management Assessments | Department of Energy

    Office of Environmental Management (EM)

    worker safety and health and nuclear safety requirements that are enforceable under 10 CFR 851 and 10 CFR 820. Leadership Emergency Management Assessments Gerald McAteer, Director ...

  12. PRIVACY IMPACT ASSESSMENT: Integrated Safety Management Workshop

    Energy Savers [EERE]

    Theron McGriff, Technical Lead Integrated Safety Management System 208-526-9859 Purpose of Registration and on-line payment web site for Integrated Safety Management Infonnatlon ...

  13. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. Lessons Learned from Cyber Security

  14. Environmental Management Assessment of the National Renewable Energy Laboratory (NREL)

    SciTech Connect (OSTI)

    Not Available

    1993-09-01

    This report documents the results of the environmental management assessment performed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. The onsite portion of the assessment was conducted from September 14 through September 27, 1993, by DOE`s Office of Environmental Audit (EH-24) located within the Office of the Assistant Secretary for Environment, Safety, and Health (EH-1). During this assessment, the activities conducted by the assessment team included reviews of internal documents and reports from previous audits and assessments; interviews with US Department of Energy (DOE) and NREL contractor personnel; and inspections and observations of selected facilities and operations. The environmental management assessment of NREL focused on the adequacy of environmental management systems and assessed the formality of programs employing an approach that recognizes the level of formality implementing environmental programs may vary commensurate with non-nuclear research and development operations. The Assessment Team evaluated environmental monitoring, waste management and National Environmental Policy Act (NEPA) activities at NREL, from a programmatic standpoint. The results of the evaluation of these areas are contained in the Environmental Protection Programs section of this report. The scope of the NREL Environmental Management Assessment was comprehensive and included all areas of environmental management. At the same time, environmental monitoring, waste management, and NEPA activities were evaluated to develop a programmatic understanding of these environmental disciplines, building upon the results of previous appraisals, audits, and reviews performed at the NREL.

  15. Enterprise Assessments Review of Radioactive Waste Management at the

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portsmouth Gaseous Diffusion Plant - December 2015 | Department of Energy Review of Radioactive Waste Management at the Portsmouth Gaseous Diffusion Plant - December 2015 Enterprise Assessments Review of Radioactive Waste Management at the Portsmouth Gaseous Diffusion Plant - December 2015 December 2015 Review of Radioactive Waste Management at the Portsmouth Gaseous Diffusion Plant The U.S. Department of Energy (DOE) Office of Nuclear Safety and Environmental Assessments, within the

  16. Hanford Site Waste Management Area C Performance Assessment (PA) Current

    Office of Environmental Management (EM)

    Status | Department of Energy Assessment (PA) Current Status Hanford Site Waste Management Area C Performance Assessment (PA) Current Status Marcel Bergeron Washignton River Protection Solutions Alaa Aly INTERA Performance and Risk Assessment Community of Practice Technical Exchange December 11-12, 2014 To view all the P&RA CoP 2014 Technical Exchange Meeting videos click here. Video Presentation - Part 1 Video Presentation - Part 2 Hanford Site Waste Management Area C Performance

  17. Assessment of light water reactor accident management programs and experience

    SciTech Connect (OSTI)

    Hammersley, R.J.

    1992-03-01

    The objective of this report is to provide an assessment of the current light water reactor experience regarding accident management programs and associated technology developments. This assessment for light water reactor (LWR) designs is provided as a resource and reference for the development of accident management capabilities for the production reactors at the Savannah River Site. The specific objectives of this assessment are as follows: 1. Perform a review of the NRC, utility, and industry (NUMARC, EPRI) accident management programs and implementation experience. 2. Provide an assessment of the problems and opportunities in developing an accident management program in conjunction or following the Individual Plant Examination process. 3. Review current NRC, utility, and industry technological developments in the areas of computational tools, severe accident predictive tools, diagnostic aids, and severe accident training and simulation.

  18. Risk assessment and management of radiofrequency radiation exposure

    SciTech Connect (OSTI)

    Dabala, Dana; Surducan, Emanoil; Surducan, Vasile; Neamtu, Camelia

    2013-11-13

    Radiofrequency radiation (RFR) industry managers, occupational physicians, security department, and other practitioners must be advised on the basic of biophysics and the health effects of RF electromagnetic fields so as to guide the management of exposure. Information on biophysics of RFR and biological/heath effects is derived from standard texts, literature and clinical experiences. Emergency treatment and ongoing care is outlined, with clinical approach integrating the circumstances of exposure and the patient's symptoms. Experimental risk assessment model in RFR chronic exposure is proposed. Planning for assessment and monitoring exposure, ongoing care, safety measures and work protection are outlining the proper management.

  19. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    '" " * .1 * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FREEDOM OF INFORMAnON ACT/ PRIVACY ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf

  20. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    .. ,. - -i * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FERNALD HISTORICAL RECORDS SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete

  1. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    :-. ., ,-- -.' * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ELECTRONIC RECORDS KEEPING SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1. Department of Energy Privacy Program, Appendix A. Privacy Impact Assessments. for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please

  2. NGNP Risk Management through Assessing Technology Readiness

    SciTech Connect (OSTI)

    John W. Collins

    2010-08-01

    Throughout the Next Generation Nuclear Plant (NGNP) project life cycle, technical risks are identified, analyzed, and mitigated and decisions are made regarding the design and selection of plant and sub-system configurations, components and their fabrication materials, and operating conditions. Risk resolution and decision making are key elements that help achieve project completion within budget and schedule constraints and desired plant availability. To achieve this objective, a formal decision-making and risk management process was developed for NGNP, based on proven systems engineering principles that have guided aerospace and military applications.

  3. Environmental Assessment : Squawfish Management Program : Final.

    SciTech Connect (OSTI)

    United States. Bonneville Power Administration.

    1992-05-01

    Bonneville Power Administration (BPA) proposes to decrease the number of northern squawfish (Ptychocheilus oregonensis) in reservoirs in the Columbia River system. The goal of the Squawfish Management Program is to reduce losses of outmigrating juvenile salmon and steelhead (salmonids) to northern squawfish predation. The objective is to reduce the number of northern squawfish that feed on juvenile salmonids (smolts) by 10 to 20 percent to alter the age and size structure of the northern squawfish population. The hypothesis, based on computer modeling, indicates that sustained northern squawfish harvest (5 to 10 years) and the resultant population restructuring may reduce losses of juvenile salmonids to predation by up to 50 percent or more within 10 years. The proposed action would target northern squawfish 11 inches and longer, the size in which northern squawfish being preying significantly on juvenile salmonids. BPA proposes to fund three types of fisheries to harvest northern squawfish. BPA also proposes to fund monitoring activities of these fisheries to determine whether desired or other results occur. The three fisheries methods proposed are: (1) commercial Tribal fishing; (2) sport reward fishing; and (3) fishing from restricted areas of each dam ( dam angling''). These fisheries were tested in 1990 and 1991.

  4. Enterprise Assessments Targeted Review of the Safety System Management of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Secondary Confinement System and Power Distribution Safety System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility - December 2015 | Department of Energy System Management of the Secondary Confinement System and Power Distribution Safety System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility - December 2015 Enterprise Assessments Targeted Review of the Safety System Management of the Secondary Confinement System and Power

  5. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ENERGY EMPLOYEES OCCUPATIONAL ILLNESS COMPENSATION PROGRAM ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program ...

  7. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  8. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events

  9. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the

  10. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  11. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  12. Conceptualising and managing trade-offs in sustainability assessment

    SciTech Connect (OSTI)

    Morrison-Saunders, Angus; Pope, Jenny

    2013-01-15

    One of the defining characteristics of sustainability assessment as a form of impact assessment is that it provides a forum for the explicit consideration of the trade-offs that are inherent in complex decision-making processes. Few sustainability assessments have achieved this goal though, and none has considered trade-offs in a holistic fashion throughout the process. Recent contributions such as the Gibson trade-off rules have significantly progressed thinking in this area by suggesting appropriate acceptability criteria for evaluating substantive trade-offs arising from proposed development, as well as process rules for how evaluations of acceptability should occur. However, there has been negligible uptake of these rules in practice. Overall, we argue that there is inadequate consideration of trade-offs, both process and substantive, throughout the sustainability assessment process, and insufficient considerations of how process decisions and compromises influence substantive outcomes. This paper presents a framework for understanding and managing both process and substantive trade-offs within each step of a typical sustainability assessment process. The framework draws together previously published literature and offers case studies that illustrate aspects of the practical application of the framework. The framing and design of sustainability assessment are vitally important, as process compromises or trade-offs can have substantive consequences in terms of sustainability outcomes delivered, with the choice of alternatives considered being a particularly significant determinant of substantive outcomes. The demarcation of acceptable from unacceptable impacts is a key aspect of managing trade-offs. Offsets can be considered as a form of trade-off within a category of sustainability that are utilised to enhance preferred alternatives once conditions of impact acceptability have been met. In this way they may enable net gains to be delivered; another imperative

  13. How social impact assessment can contribute to conflict management

    SciTech Connect (OSTI)

    Prenzel, Paula V. Vanclay, Frank

    2014-02-15

    The potential for conflict is omnipresent in all projects, and even in all human interactions, and conflict itself leads to many second-order social impacts. This article examines the contribution of the methodological approach used in social impact assessment (SIA) to conflict management. We view conflict as a process that has its own dynamic, and is to be expected in all situations. By using game theory (prisoner's dilemma), we describe and conceptualize this process and highlight the importance of communication in managing conflict. We demonstrate the potential use of SIA in preventing, managing and resolving conflict. Emphasis is placed on the participatory character of SIA and the role of public media. In contrast to existing literature, our focus is not restricted to the typical fields of study of SIA (e.g. environmental conflicts), but understands conflict itself as a field of application. In this sense, conflict-sensitive SIA can be understood both as an extension to the SIA tool kit and a broadening of the scope of SIA application. -- Highlights: Conflict is omnipresent and creates both positive and negative social impacts. Conflict itself represents a possible field of application for SIA. Conflict escalation is a process that can be modeled in a game-theoretic framework. There needs to be concerted effort to prevent escalation to avoid harmful outcomes. Conflict-sensitive SIA can support conflict management and sustainable resolution.

  14. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. Top 10 Vulnerabilities of

  15. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED

  16. Life cycle assessment of construction and demolition waste management

    SciTech Connect (OSTI)

    Butera, Stefania Christensen, Thomas H.; Astrup, Thomas F.

    2015-10-15

    Highlights: • LCA of C&DW utilisation in road vs. C&DW landfilling. • C&DW utilisation in road better than landfilling for most categories. • Transportation is the most important process in non-toxic impact categories. • Leaching of oxyanions is the critical process in toxic impact categories. • Modelling of Cr fate in the subsoil is highly influential to the results. - Abstract: Life cycle assessment (LCA) modelling of construction and demolition waste (C&DW) management was carried out. The functional unit was management of 1 Mg mineral, source separated C&DW, which is either utilised in road construction as a substitute for natural aggregates, or landfilled. The assessed environmental impacts included both non-toxic and toxic impact categories. The scenarios comprised all stages of the end-of-life management of C&DW, until final disposal of all residues. Leaching of inorganic contaminants was included, as was the production of natural aggregates, which was avoided because of the use of C&DW. Typical uncertainties related to contaminant leaching were addressed. For most impact categories, utilisation of C&DW in road construction was preferable to landfilling; however, for most categories, utilisation resulted in net environmental burdens. Transportation represented the most important contribution for most nontoxic impacts, accounting for 60–95 per cent of these impacts. Capital goods contributed with negligible impacts. Leaching played a critical role for the toxic categories, where landfilling had lower impacts than utilisation because of the lower levels of leachate per ton of C&DW reaching the groundwater over a 100-year perspective. Leaching of oxyanions (As, V and Sb) was critical with respect to leaching. Typical experimental uncertainties in leaching data did not have a pivotal influence on the results; however, accounting for Cr immobilisation in soils as part of the impact assessment was critical for modelling the leaching impacts. Compared

  17. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  18. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  19. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  20. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  1. Enforcement Guidance Supplement 01-02: Management and Independent Assessment

    Office of Energy Efficiency and Renewable Energy (EERE)

    Section 1.3 of the Operational Procedures for Enforcement, published in June 1998, provides the opportunity for the Office of Price-Anderson Enforcement (OE) to periodically issue clarifying guidance regarding the processes used in its enforcement activities. OE typically issues such guidance in the form of Enforcement Guidance Supplements (EGSs), which provide information or recommendations only and impose no requirements or actions on DOE contractors. DOE enforcement activities to date have indicated the need for improvement in contractor compliance with the Management and Independent Assessment (M&IA) requirements of 10 CFR 830.122. This EGS signals an increased emphasis by OE in this area, and describes the general approach that will be used by OE in evaluating compliance of nuclear-safety related M&IA Programs.

  2. Life cycle assessment of bagasse waste management options

    SciTech Connect (OSTI)

    Kiatkittipong, Worapon; Wongsuchoto, Porntip; Pavasant, Prasert

    2009-05-15

    Bagasse is mostly utilized for steam and power production for domestic sugar mills. There have been a number of alternatives that could well be applied to manage bagasse, such as pulp production, conversion to biogas and electricity production. The selection of proper alternatives depends significantly on the appropriateness of the technology both from the technical and the environmental points of view. This work proposes a simple model based on the application of life cycle assessment (LCA) to evaluate the environmental impacts of various alternatives for dealing with bagasse waste. The environmental aspects of concern included global warming potential, acidification potential, eutrophication potential and photochemical oxidant creation. Four waste management scenarios for bagasse were evaluated: landfilling with utilization of landfill gas, anaerobic digestion with biogas production, incineration for power generation, and pulp production. In landfills, environmental impacts depended significantly on the biogas collection efficiency, whereas incineration of bagasse to electricity in the power plant showed better environmental performance than that of conventional low biogas collection efficiency landfills. Anaerobic digestion of bagasse in a control biogas reactor was superior to the other two energy generation options in all environmental aspects. Although the use of bagasse in pulp mills created relatively high environmental burdens, the results from the LCA revealed that other stages of the life cycle produced relatively small impacts and that this option might be the most environmentally benign alternative.

  3. A mathematically guided strategy for risk assessment and management.

    SciTech Connect (OSTI)

    Cooper, James Arlin

    2005-03-01

    Strategies for risk assessment and management of high consequence operations are often based on factors such as physical analysis, analysis of software and other logical processing, and analysis of statistically determined human actions. Conventional analysis methods work well for processing objective information. However, in practical situations, much or most of the data available are subjective. Also, there are potential resultant pitfalls where conventional analysis might be unrealistic, such as improperly using event tree and fault tree failure descriptions where failures or events are soft (partial) rather than crisp (binary), neglecting or misinterpreting dependence (positive, negative, correlation), and aggregating nonlinear contributions linearly. There are also personnel issues that transcend basic human factors statistics. For example, sustained productivity and safety in critical operations can depend on the morale of involved personnel. In addition, motivation is significantly influenced by 'latent effects', which are pre-occurring influences. This paper addresses these challenges and proposes techniques for subjective risk analysis, latent effects risk analysis and a hybrid analysis that also includes objective risk analysis. The goal is an improved strategy for risk management.

  4. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  5. Final Environmental assessment for the Uranium Lease Management Program

    SciTech Connect (OSTI)

    1995-07-01

    The US Department of Energy (DOE) has prepared a programmatic environmental assessment (EA) of the proposed action to continue leasing withdrawn lands and DOE-owned patented claims for the exploration and production of uranium and vanadium ores. The Domestic Uranium Program regulation, codified at Title 10, Part 760.1, of the US Code of Federal Regulations (CFR), gives DOE the flexibility to continue leasing these lands under the Uranium Lease Management Program (ULMP) if the agency determines that it is in its best interest to do so. A key element in determining what is in DOE`s ``best interest`` is the assessment of the environmental impacts that may be attributable to lease tract operations and associated activities. On the basis of the information and analyses presented in the EA for the ULMP, DOE has determined that the proposed action does not constitute a major Federal action significantly affecting the quality of the human environment, as defined in the National Environmental Policy Act (NEPA) of 1969 (42 United States Code 4321 et seq.), as amended.Therefore, preparation of an environmental impact statement is not required for the ULMP,and DOE is issuing this Finding, of No Significant Impact (FONSI).

  6. Assessment of Disposal Options for DOE-Managed High-Level Radioactive...

    Energy Savers [EERE]

    The Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and Spent Nuclear Fuel report assesses the technical options for the safe and permanent disposal of ...

  7. Cyber Assessment Methods for SCADA Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the...

  8. Taxonomy of USA east coast fishing communities in terms of social vulnerability and resilience

    SciTech Connect (OSTI)

    Pollnac, Richard B.; Seara, Tarsila; Colburn, Lisa L.; Jepson, Michael

    2015-11-15

    Increased concern with the impacts that changing coastal environments can have on coastal fishing communities led to a recent effort by NOAA Fisheries social scientists to develop a set of indicators of social vulnerability and resilience for the U.S. Southeast and Northeast coastal communities. A goal of the NOAA Fisheries social vulnerability and resilience indicator program is to support time and cost effective use of readily available data in furtherance of both social impact assessments of proposed changes to fishery management regulations and climate change adaptation planning. The use of the indicators to predict the response to change in coastal communities would be enhanced if community level analyses could be grouped effectively. This study examines the usefulness of combining 1130 communities into 35 relevant subgroups by comparing results of a numerical taxonomy with data collected by interview methods, a process herein referred to as “ground-truthing.” The validation of the taxonomic method by the method of ground-truthing indicates that the clusters are adequate to be used to select communities for in-depth research. - Highlights: • We develop a taxonomy of fishing communities based on vulnerability indicators. • We validate the community clusters through the use of surveys (“ground-truthing”). • Clusters differ along important aspects of fishing community vulnerability. • Clustering communities allows for accurate and timely social impact assessments.

  9. Climate Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  10. Lawrence Livermore National Security CFO Processes Functional Management Assessment

    SciTech Connect (OSTI)

    Sparks, A; Sampson, D; Thomas, B; Mendez, M

    2008-06-12

    The scope of the Functional Management Assessment of the CFO included a review of the CFO Organizational Structure, including deployed financial services and the division of responsibilities and internal controls between CFO and other organizations that perform financial functions across the Laboratory. In addition, the assessment team solicited input from end users and reviewers. Three issues discussed are: ISSUE 1: Financial activities and cash transactions are occurring outside the CFO organization. Approximately $200M of non-purchase order spending occurs in seven areas outside CFO control (travel, relocation, special disbursements, IPO, legal, risk management, and freight). NIF financial services have not been integrated into the CFO organization and operate outside CFO control. Business risks--There is no single point of financial accountably; Currently within the CFO and Business and Operations organizations there is a lack of clarity of roles and responsibilities for financial activities; Financial talent within the laboratory is fragmented; and Inefficiencies exist based on the current structure; An example of the above business risks associated with organizational structure can be observed in the process for reimbursement of relocation costs to employees. Currently, Human Resources and Travel both administer portions of an employee's relocation. Costs are reviewed for compliance with FAR travel guidelines and for compliance with the offer letter but there is no financial review for allowability of costs nor is there a single point where the total relocation costs are reviewed. Through the e-pay system the check is processed by the CFO organization but there is no review by that organization. ISSUE 2: Impact of involuntary separation on current and future activities. 3 risks are: (1) Loss of internal controls--with the upcoming involuntary reductions there will be a loss of personnel with institutional knowledge which will increase the risk of losing

  11. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis ...

  12. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

  13. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis...

  14. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity...

  15. Environment, safety and health progress assessment of the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Not Available

    1991-11-01

    This report documents the results of the Environment, Safety, and Health (ES&H) Progress Assessment of the Fernald Environmental Management Project (FEMP), Fernald, Ohio, conducted from October 15 through October 25, 1991. The Secretary of Energy directed that small, focused, ES&H Progress Assessments be performed as part of the continuing effort to institutionalize line management accountability and the self-assessment process in the areas of ES&H. The FEMP assessment is the pilot assessment for this new program. The objectives for the FEMP ES&H Progress Assessment were to assess: (1) how the FEMP has progressed since the 1989 Tiger Assessment; (2) how effectively the FEMP has corrected specific deficiencies and associated root causes identified by that team; and (3) whether the current organization, resources, and systems are sufficient to proactively manage ES&H issues.

  16. Enterprise Assessments Targeted Review of the Safety System Management...

    Energy Savers [EERE]

    Complex (Y-12) Highly Enriched Uranium Materials Facility (HEUMF). Consolidated Nuclear Security, LLC (CNS) is the management and operating contractor for Y-12. This ...

  17. Senior Technical Safety Manager Qualification Program Self-Assessment...

    Energy Savers [EERE]

    In accordance CNS Standard Operating Procedure SOP-016, Senior Technical Safety Manager ... More Documents & Publications 2011 Annual Workforce Analysis and Staffing Plan Report - ...

  18. Adaptive capacity and its assessment

    SciTech Connect (OSTI)

    Engle, Nathan L.

    2011-04-20

    This paper reviews the concept of adaptive capacity and various approaches to assessing it, particularly with respect to climate variability and change. I find that adaptive capacity is a relatively under-researched topic within the sustainability science and global change communities, particularly since it is uniquely positioned to improve linkages between vulnerability and resilience research. I identify opportunities for advancing the measurement and characterization of adaptive capacity by combining insights from both vulnerability and resilience frameworks, and I suggest several assessment approaches for possible future development that draw from both frameworks and focus on analyzing the governance, institutions, and management that have helped foster adaptive capacity in light of recent climatic events.

  19. COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2 nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to display, copy, publish, and distribute this document in its

  20. Save Energy Now Assessment Helps Expand Energy Management Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    KB) More Documents & Publications Terra Nitrogen Company, L.P.: Ammonia Plant Greatly ... Save Energy Now Assessment Steam System Efficiency Optimized After J.R. Simplot Fertilizer ...

  1. Save Energy Now Assessment Helps Expand Energy Management Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Based on recommendations from their Save Energy Now assessment, Shaw Industries plant 20 ... boiler tubes, Shaw Industries' Dalton plant achieved significant energy savings. * ...

  2. Cost Quality Management Assessment for the Idaho Operations Office. Final report

    SciTech Connect (OSTI)

    1995-06-01

    The Office of Engineering and Cost Management (EM-24) conducted a Cost Quality Management Assessment of EM-30 and EM-40 activities at the Idaho National Engineering Laboratory on Feb. 3--19, 1992 (Round I). The CQMA team assessed the cost and cost-related management activities at INEL. The Round II CQMA, conducted at INEL Sept. 19--29, 1994, reviewed EM-30, EM-40, EM-50, and EM-60 cost and cost-related management practices against performance objectives and criteria. Round II did not address indirect cost analysis. INEL has made measurable progress since Round I.

  3. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  4. Fiscal Year 2007 Civilian Radioactive Waste Management Fee Adequacy Assessment Report

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Office of Civilian Radioactive Waste Management Fee Adequacy Assessment Report is to present an analysis of the adequacy of the fee being paid by nuclear power utilities...

  5. Senior Technical Safety Manager Qualification Program Self-Assessment- Chief of Nuclear Safety

    Broader source: Energy.gov [DOE]

    This Chief of Nuclear Safety (CNS) Report was prepared to summarize the results of the July 2013 CNS self-assessment of the Senior Technical Safety Manager Qualification Program.

  6. Environmental management assessment of the Waste Isolation Pilot Plant (WIPP), Carlsbad, New Mexico

    SciTech Connect (OSTI)

    Not Available

    1993-07-01

    This document contains the results of the Environmental Management Assessment of the Waste Isolation Pilot Plant (WIPP). This Assessment was conducted by EH-24 from July 19 through July 30, 1993 to advise the Secretary of Energy of the adequacy of management systems established at WIPP to ensure the protection of the environment and compliance with Federal, state, and DOE environmental requirements. The mission of WIPP is to demonstrate the safe disposal of transuranic (TRU) waste. During this assessment, activities and records were reviewed and interviews were conducted with personnel from the management and operating contractors. This assessment revealed that WIPP`s environmental safety and health programs are satisfactory, and that all levels of the Waste Isolation Division (WID) management and staff consistently exhibit a high level of commitment to achieve environmental excellence.

  7. A framework for the assessment of severe accident management strategies

    SciTech Connect (OSTI)

    Kastenberg, W.E.; Apostolakis, G.; Dhir, V.K.

    1993-09-01

    Severe accident management can be defined as the use of existing and/or altemative resources, systems and actors to prevent or mitigate a core-melt accident. For each accident sequence and each combination of severe accident management strategies, there may be several options available to the operator, and each involves phenomenological and operational considerations regarding uncertainty. Operational uncertainties include operator, system and instrumentation behavior during an accident. A framework based on decision trees and influence diagrams has been developed which incorporates such criteria as feasibility, effectiveness, and adverse effects, for evaluating potential severe accident management strategies. The framework is also capable of propagating both data and model uncertainty. It is applied to several potential strategies including PWR cavity flooding, BWR drywell flooding, PWR depressurization and PWR feed and bleed.

  8. Hanford Site Waste Management Area C Performance Assessment

    Broader source: Energy.gov [DOE]

    Presentation from the 2015 Annual Performance and Risk Assessment (P&RA) Community of Practice (CoP) Technical Exchange Meeting held in Richland, Washington on December 15-16, 2015.

  9. Assessment of public perception of radioactive waste management in Korea.

    SciTech Connect (OSTI)

    Trone, Janis R.; Cho, SeongKyung; Whang, Jooho; Lee, Moo Yul

    2011-11-01

    The essential characteristics of the issue of radioactive waste management can be conceptualized as complex, with a variety of facets and uncertainty. These characteristics tend to cause people to perceive the issue of radioactive waste management as a 'risk'. This study was initiated in response to a desire to understand the perceptions of risk that the Korean public holds towards radioactive waste and the relevant policies and policy-making processes. The study further attempts to identify the factors influencing risk perceptions and the relationships between risk perception and social acceptance.

  10. U.S. Energy Sector Vulnerability Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerability Report U.S. Energy Sector Vulnerability Report As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation' energy system. Two reports have been released that examine the current and potential future impacts of climate change and extreme weather on the

  11. Management of the Area 5 Radioactive Waste Management Site using Decision-based, Probabilistic Performance Assessment Modeling

    SciTech Connect (OSTI)

    Carilli, J.; Crowe, B.; Black, P.; Tauxe, J.; Stockton, T.; Catlett, K.; Yucel, V.

    2003-02-27

    Low-level radioactive waste from cleanup activities at the Nevada Test Site and from multiple sites across the U.S. Department of Energy (DOE) complex is disposed at two active Radioactive Waste Management Sites (RWMS) on the Nevada Test Site. These facilities, which are managed by the DOE National Nuclear Security Administration Nevada Site Office, were recently designated as one of two regional disposal centers and yearly volumes of disposed waste now exceed 50,000 m3 (> 2 million ft3). To safely and cost-effectively manage the disposal facilities, the Waste Management Division of Environmental Management has implemented decision-based management practices using flexible and problem-oriented probabilistic performance assessment modeling. Deterministic performance assessments and composite analyses were completed originally for the Area 5 and Area 3 RWMSs located in, respectively, Frenchman Flat and Yucca Flat on the Nevada Test Site. These documents provide the technical bases for issuance of disposal authorization statements for continuing operation of the disposal facilities. Both facilities are now in a maintenance phase that requires testing of conceptual models, reduction of uncertainty, and site monitoring all leading to eventual closure of the facilities and transition to long-term stewardship.

  12. Enterprise Assessments Review of the Pantex Plant Emergency Management

    Energy Savers [EERE]

    Hanford K-West Annex Facility OAR EA-HANFORD-2014-09 thru 2015-06 | Department of Energy for the Review of the Hanford K-West Annex Facility OAR EA-HANFORD-2014-09 thru 2015-06 Enterprise Assessments Operational Awareness Record for the Review of the Hanford K-West Annex Facility OAR EA-HANFORD-2014-09 thru 2015-06 September 2015 Operational Awareness Record for the Review of the Hanford K-West Annex Facility The Department of Energy independent Office of Enterprise Assessments' Office of

  13. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  14. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  15. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  16. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system

  17. United States Environmental Protection Agency: Use of risk assessment and risk management methodologies. Master's thesis

    SciTech Connect (OSTI)

    Lamuro, R.J.

    1992-09-30

    Make a full investigation of the policy implications and appropriate uses of risk assessment and risk management in regulatory programs under various Federal laws to prevent cancer and other chronic health effects which may result from exposure to hazardous substances. This is the primary mission of the Risk Assessment and Management Commission (Risk Commission). The Clean Air Act Amendments of 1990 (CAAA), created the Risk Commission reflecting Congress' concern over agency use of risk assessment and risk management techniques and methodologies to implement federal laws protective of human health. The Risk Commission is to consider: methods for measuring and describing risks of chronic health effects from hazardous substances; methods to reflect uncertainties associated with estimation techniques, and whether it is possible or desirable to develop a consistent risk assessment methodology or a consistent standard of acceptable risk for various federal programs.

  18. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  19. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  20. Integrating impact assessment and conflict management in urban planning: Experiences from Finland

    SciTech Connect (OSTI)

    Peltonen, Lasse; Sairinen, Rauno

    2010-09-15

    The article examines the interlinkages between recent developments in conflict management and impact assessment procedures in the context of urban planning in Finland. It sets out by introducing the fields of impact assessment and conflict mediation. It then proceeds to discuss the development of impact assessment practices and the status of conflict mediation in Finnish land use planning. The case of Korteniitty infill development plan in Jyvaeskylae is used to demonstrate how the Finnish planning system operates in conflict situations - and how social impact assessment can contribute to managing planning conflicts. The authors ask how the processes of impact assessment contribute to conflict management. Based on the Finnish experience, it is argued that social impact assessment of land use plans can contribute to conflict management, especially in the absence of institutionalised conflict mediation processes. In addition, SIA may acquire features of conflict mediation, depending on extent and intensity of stakeholder participation in the process, and the quality of linkages it between knowledge production and decision-making. Simultaneously, conflict mediation practices and theoretical insights can inform the application of SIA to help it address land use conflicts more consciously.

  1. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  2. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-179: IBM Java 7 Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-094: IBM Multiple Products Multiple...

  3. Natural resource management activities at the Savannah River Site. Environmental Assessment

    SciTech Connect (OSTI)

    Not Available

    1993-07-01

    This environmental assessment (EA) reviews the environmental consequences of ongoing natural resource management activities on the Savannah River Site (SRS). Appendix A contains the Natural Resources Management Plant (NRMP). While several SRS organizations have primary responsibilities for different elements of the plan, the United States Department of Agriculture (USDA), Forest Service, Savannah River Forest Station (SRFS) is responsible for most elements. Of the river scenarios defined in 1985, the High-Intensity Management alternative established the upper bound of environmental consequences; it represents a more intense level of resource management than that being performed under current resource management activities. This alternative established compliance mechanisms for several natural resource-related requirements and maximum practical timber harvesting. Similarly, the Low-Intensity Management alternative established the lower bound of environmental consequences and represents a less intense level of resource management than that being performed under current resource management activities. This alternative also established compliance mechanisms, but defined a passively managed natural area. The Proposed Action of this EA describes the current level of multiple-natural resource management. This EA reviews the proposed action, and the high and low intensity alternative scenarios.

  4. An examination of the role of risk assessment in superfund program management, implementation, and evaluation

    SciTech Connect (OSTI)

    Bala, S.

    1995-12-01

    Human health risk assessment is playing an increasing role in the characterization of the nature and extent of human health threats posed by Superfund hazardous waste sites, and the prioritization of these sites for remediation activities. Risk assessment also plays a central role in initiatives to measure and evaluate the program`s progress in remediating these sites, and in efforts to communicate that progress to a diverse audience. This paper examines the current role of risk assessment in Superfund`s program management, implementation, and evaluation activities, and advocates the need for a comprehensive plan to enhance and systematically apply risk assessment information across all of these activities. Specifically, this paper examines the role of risk assessment at three levels: (1) the current role of risk information in Superfund`s program management activities; (2) the current role of risk information in the implementation of site cleanup; (3) profile of Superfund`s approach to measuring, evaluating, and communicating site remediation progress via Environmental Indicators (EIs). Building on this three-level examination, this paper calls for the development of a comprehensive plan for the enhanced and systematic application of risk assessment information in Superfund`s program management, implementation, and evaluation activities. This paper also draws upon the current literature on risk assessment and measurement, risk-based planning and decision-making, and risk communication.

  5. Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment

    SciTech Connect (OSTI)

    Irving, John S

    2003-04-01

    DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

  6. Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment - April 2003

    SciTech Connect (OSTI)

    Irving, J.S.

    2003-04-30

    DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

  7. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report

    SciTech Connect (OSTI)

    1994-09-01

    This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

  8. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  9. RCRA Assessment Plan for Single-Shell Tank Waste Management Area A-AX at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, Susan M.; Chou, Charissa J.

    2006-03-03

    This document describes a groundwater assessment plan for the single-shell tank systems in Waste Management Area A-AX at the Hanford Site.

  10. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  11. V-132: IBM Tivoli System Automation Application Manager Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security

  12. Assessment and comparison of waste management costs for nuclear and fossil energy sources

    SciTech Connect (OSTI)

    Long, F.G.; Zaccai, H.; Ward, R.D.; McNicholas, P.; Albers, R.W.

    1993-12-31

    This paper presents the key results of an assessment of waste management costs undertaken by a group of international experts on behalf of the IAEA, Vienna. The objective of this work is to provide an assessment and comparison of the impact of waste management on the cost of electricity production from nuclear and other energy sources. The study focuses on the cost of managing wastes arising from the production of electricity from a PWR, with and without reprocessing, a coal-fueled conventional steam cycle, and a gas-fueled combined cycle; using data available in the open literature. This study has only assessed the impact of those waste management costs which are typically internalized by an electric utility and passed on as part of the price charged to customers. The data utilized in the study is typically in range form, reflecting worldwide experience with such factors as technology, regulatory requirements and economic parameters. To the extent that estimates can be identified in the literature the study has attempted to include costs associated with waste management from all stages of the fuel cycles. This paper also includes a discussion of future developments which may influence the results of this work including the effect of technology advances and changes in regulatory requirements.

  13. EIS-0220: Interim Management of Nuclear Materials at the Savannah River Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    This environmental impact statement assesses the potential environmental impacts of actions necessary to manage nuclear materials at the Savannah River Site (SRS) in Aiken, South Carolina, until decisions on their ultimate disposition are made and implemented. The Department of Energy has decided to initiate actions which will stabilize certain of the SRS materials that represent environment, safety and health vulnerabilities in their current storage condition or which may represent a vulnerability within the next 10 years.

  14. Risk management & organizational uncertainty implications for the assessment of high consequence organizations

    SciTech Connect (OSTI)

    Bennett, C.T.

    1995-02-23

    Post hoc analyses have demonstrated clearly that macro-system, organizational processes have played important roles in such major catastrophes as Three Mile Island, Bhopal, Exxon Valdez, Chernobyl, and Piper Alpha. How can managers of such high-consequence organizations as nuclear power plants and nuclear explosives handling facilities be sure that similar macro-system processes are not operating in their plants? To date, macro-system effects have not been integrated into risk assessments. Part of the reason for not using macro-system analyses to assess risk may be the impression that standard organizational measurement tools do not provide hard data that can be managed effectively. In this paper, I argue that organizational dimensions, like those in ISO 9000, can be quantified and integrated into standard risk assessments.

  15. Scientific basis for risk assessment and management of uranium mill tailings

    SciTech Connect (OSTI)

    Not Available

    1986-01-01

    A National Research Council study panel, convened by the Board on Radioactive Waste Management, has examined the scientific basis for risk assessment and management of uranium mill tailings and issued this final report containing a number of recommendations. Chapter 1 provides a brief introduction to the problem. Chapter 2 examines the processes of uranium extraction and the mechanisms by which radionuclides and toxic chemicals contained in the ore can enter the environment. Chapter 3 is devoted to a review of the evidence on health risks associated with radon and its decay products. Chapter 4 provides a consideration of conventional and possible new technical alternatives for tailings management. Chapter 5 explores a number of issues of comparative risk, provides a brief history of uranium mill tailings regulation, and concludes with a discussion of choices that must be made in mill tailing risk management. 211 refs., 30 figs., 27 tabs.

  16. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 85: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT:

  17. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  18. LCA-IWM: A decision support tool for sustainability assessment of waste management systems

    SciTech Connect (OSTI)

    Boer, J. den Boer, E. den; Jager, J.

    2007-07-01

    The paper outlines the most significant result of the project 'The use of life cycle assessment tools for the development of integrated waste management strategies for cities and regions with rapid growing economies', which was the development of two decision-support tools: a municipal waste prognostic tool and a waste management system assessment tool. The article focuses on the assessment tool, which supports the adequate decision making in the planning of urban waste management systems by allowing the creation and comparison of different scenarios, considering three basic subsystems: (i) temporary storage; (ii) collection and transport and (iii) treatment, disposal and recycling. The design and analysis options, as well as the assumptions made for each subsystem, are shortly introduced, providing an overview of the applied methodologies and technologies. The sustainability assessment methodology used in the project to support the selection of the most adequate scenario is presented with a brief explanation of the procedures, criteria and indicators applied on the evaluation of each of the three sustainability pillars.

  19. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  20. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  1. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  2. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  3. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  4. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  5. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  6. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  7. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  8. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  9. A multi-criteria decision analysis assessment of waste paper management options

    SciTech Connect (OSTI)

    Hanan, Deirdre; Burnley, Stephen; Cooke, David

    2013-03-15

    Highlights: ► Isolated communities have particular problems in terms of waste management. ► An MCDA tool allowed a group of non-experts to evaluate waste management options. ► The group preferred local waste management solutions to export to the mainland. ► Gasification of paper was the preferred option followed by recycling. ► The group concluded that they could be involved in the decision making process. - Abstract: The use of Multi-criteria Decision Analysis (MCDA) was investigated in an exercise using a panel of local residents and stakeholders to assess the options for managing waste paper on the Isle of Wight. Seven recycling, recovery and disposal options were considered by the panel who evaluated each option against seven environmental, financial and social criteria. The panel preferred options where the waste was managed on the island with gasification and recycling achieving the highest scores. Exporting the waste to the English mainland for incineration or landfill proved to be the least preferred options. This research has demonstrated that MCDA is an effective way of involving community groups in waste management decision making.

  10. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  11. Waste management project's alternatives: A risk-based multi-criteria assessment (RBMCA) approach

    SciTech Connect (OSTI)

    Karmperis, Athanasios C.; Sotirchos, Anastasios; Aravossis, Konstantinos; Tatsiopoulos, Ilias P.

    2012-01-15

    Highlights: Black-Right-Pointing-Pointer We examine the evaluation of a waste management project's alternatives. Black-Right-Pointing-Pointer We present a novel risk-based multi-criteria assessment (RBMCA) approach. Black-Right-Pointing-Pointer In the RBMCA the evaluation criteria are based on the quantitative risk analysis of the project's alternatives. Black-Right-Pointing-Pointer Correlation between the criteria weight values and the decision makers' risk preferences is examined. Black-Right-Pointing-Pointer Preference to the multi-criteria against the one-criterion evaluation process is discussed. - Abstract: This paper examines the evaluation of a waste management project's alternatives through a quantitative risk analysis. Cost benefit analysis is a widely used method, in which the investments are mainly assessed through the calculation of their evaluation indicators, namely benefit/cost (B/C) ratios, as well as the quantification of their financial, technical, environmental and social risks. Herein, a novel approach in the form of risk-based multi-criteria assessment (RBMCA) is introduced, which can be used by decision makers, in order to select the optimum alternative of a waste management project. Specifically, decision makers use multiple criteria, which are based on the cumulative probability distribution functions of the alternatives' B/C ratios. The RBMCA system is used for the evaluation of a waste incineration project's alternatives, where the correlation between the criteria weight values and the decision makers' risk preferences is analyzed and useful conclusions are discussed.

  12. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  13. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 2

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A.

    1995-06-30

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation.

  14. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 1

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A.

    1995-06-30

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation. These Appendices contain the Federal Register Notice, comments on evaluation factors, independent technical reviewers resumes, independent technical reviewers manual, and technology information packages.

  15. Environmental assessment of garden waste management in the Municipality of Aarhus, Denmark

    SciTech Connect (OSTI)

    Boldrin, Alessio; Andersen, Jacob K.; Christensen, Thomas H.

    2011-07-15

    An environmental assessment of six scenarios for handling of garden waste in the Municipality of Aarhus (Denmark) was performed from a life cycle perspective by means of the LCA-model EASEWASTE. In the first (baseline) scenario, the current garden waste management system based on windrow composting was assessed, while in the other five scenarios alternative solutions including incineration and home composting of fractions of the garden waste were evaluated. The environmental profile (normalised to Person Equivalent, PE) of the current garden waste management in Aarhus is in the order of -6 to 8 mPE Mg{sup -1} ww for the non-toxic categories and up to 100 mPE Mg{sup -1} ww for the toxic categories. The potential impacts on non-toxic categories are much smaller than what is found for other fractions of municipal solid waste. Incineration (up to 35% of the garden waste) and home composting (up to 18% of the garden waste) seem from an environmental point of view suitable for diverting waste away from the composting facility in order to increase its capacity. In particular the incineration of woody parts of the garden waste improved the environmental profile of the garden waste management significantly.

  16. RCRA Assessment Plan for Single-Shell Tank Waste Management Area TX-TY

    SciTech Connect (OSTI)

    Horton, Duane G.

    2007-03-26

    WMA TX-TY contains underground, single-shell tanks that were used to store liquid waste that contained chemicals and radionuclides. Most of the liquid has been removed, and the remaining waste is regulated under the RCRA as modified in 40 CFR Part 265, Subpart F and Washington States Hazardous Waste Management Act . WMA TX-TY was placed in assessment monitoring in 1993 because of elevated specific conductance. A groundwater quality assessment plan was written in 1993 describing the monitoring activities to be used in deciding whether WMA TX-TY had affected groundwater. That plan was updated in 2001 for continued RCRA groundwater quality assessment as required by 40 CFR 265.93 (d)(7). This document further updates the assessment plan for WMA TX-TY by including (1) information obtained from ten new wells installed at the WMA after 1999 and (2) information from routine quarterly groundwater monitoring during the last five years. Also, this plan describes activities for continuing the groundwater assessment at WMA TX TY.

  17. ROLE OF TOXICITY ASSESSMENT AND MONITORING IN MANAGING THE RECOVERY OF A WASTEWATER RECEIVING STREAM

    SciTech Connect (OSTI)

    Greeley Jr, Mark Stephen; Kszos, Lynn A; Stewart, Arthur J; Smith, John G

    2011-01-01

    We evaluate the roles of a long-term comprehensive toxicity assessment and monitoring program in management and for ecological recovery of a freshwater receiving stream impacted by industrial discharges and legacy contamination. National Pollution Discharge Elimination Permit (NPDES)-driven whole effluent toxicity (WET) tests using Ceriodaphnia and fathead minnows were conducted for more than twenty years to characterize wastewaters at the US National Nuclear Security Agency s Y-12 National Security Complex in Oak Ridge, Tennessee. Ambient toxicity tests also were conducted to assess water samples from EFPC, the stream receiving the wastewater discharges. The ambient tests were conducted as part of an extensive biological monitoring program that included routine surveys of fish, invertebrate and periphyton communities. WET testing, associated toxicant identification evaluations (TIEs), and ambient toxicity monitoring were instrumental in identifying toxicants and their sources at the Y-12 Complex, guiding modifications to wastewater treatment procedures, and assessing the success of various pollution-abatement actions. Through time, as requirements changed and water quality improved, the toxicity monitoring program became more focused. Ambient testing with Ceriodaphnia and fathead minnow larvae also was supplemented with less-standardized but more-sensitive alternative laboratory and in situ bioassays. The Y-12 Complex biological monitoring experience demonstrates the significant roles effluent and ambient toxicity testing can have in controlling and managing toxic discharges to receiving waters. It also emphasizes the value of supplementing WET and standardized ambient toxicity tests with alternative laboratory and in situ toxicity tests tailored to address specific problems.

  18. Result Summary for the Area 5 Radioactive Waste Management Site Performance Assessment Model Version 4.113

    SciTech Connect (OSTI)

    Shott, G. J.

    2012-04-15

    Preliminary results for Version 4.113 of the Nevada National Security Site Area 5 Radioactive Waste Management Site performance assessment model are summarized. Version 4.113 includes the Fiscal Year 2011 inventory estimate.

  19. Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and Spent Nuclear Fuel

    Broader source: Energy.gov [DOE]

    The Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and Spent Nuclear Fuel report assesses the technical options for the safe and permanent disposal of high-level radioactive waste (HLW) and spent nuclear fuel (SNF) managed by the Department of Energy. Specifically, it considers whether DOE-managed HLW and SNF should be disposed of with commercial SNF and HLW in one geologic repository or whether there are advantages to developing separate geologic disposal pathways for some DOE-managed HLW and SNF. The report recommends that the Department begin implementation of a phased, adaptive, and consent-based strategy with development of a separate mined repository for some DOE-managed HLW and cooler DOE-managed SNF.

  20. Groundwater contamination. Volume 2: Management, containment, risk assessment and legal issues

    SciTech Connect (OSTI)

    Rail, C.D.

    2000-07-01

    This book explains in a comprehensive way the sources for groundwater contamination, the regulations governing it, and the technologies for abating it. Volume 2 discusses aquifer management, including technologies to control and stabilize multiple influxes into the water table. This volume outlines strategies for stormwater control and groundwater restoration and presents numerous case histories of site analysis and remediation based on DOE and state documents. Among the many new features of this edition are a full discussion of risk assessment, the preparation of groundwater protection plans, and references linking the text to over 2,300 water-related Web sites.

  1. Baseline Risk Assessment Supporting Closure at Waste Management Area C at the Hanford Site Washington

    SciTech Connect (OSTI)

    Singleton, Kristin M.

    2015-01-07

    The Office of River Protection under the U.S. Department of Energy is pursuing closure of the Single-Shell Tank (SST) Waste Management Area (WMA) C under the requirements of the Hanford Federal Facility Agreement and Consent Order (HFFACO). A baseline risk assessment (BRA) of current conditions is based on available characterization data and information collected at WMA C. The baseline risk assessment is being developed as a part of a Resource Conservation and Recovery Act (RCRA) Facility Investigation (RFI)/Corrective Measures Study (CMS) at WMA C that is mandatory under Comprehensive Environmental Response, Compensation, and Liability Act and RCRA corrective action. The RFI/CMS is needed to identify and evaluate the hazardous chemical and radiological contamination in the vadose zone from past releases of waste from WMA C. WMA C will be under Federal ownership and control for the foreseeable future, and managed as an industrial area with restricted access and various institutional controls. The exposure scenarios evaluated under these conditions include Model Toxics Control Act (MTCA) Method C, industrial worker, maintenance and surveillance worker, construction worker, and trespasser scenarios. The BRA evaluates several unrestricted land use scenarios (residential all-pathway, MTCA Method B, and Tribal) to provide additional information for risk management. Analytical results from 13 shallow zone (0 to 15 ft. below ground surface) sampling locations were collected to evaluate human health impacts at WMA C. In addition, soil analytical data were screened against background concentrations and ecological soil screening levels to determine if soil concentrations have the potential to adversely affect ecological receptors. Analytical data from 12 groundwater monitoring wells were evaluated between 2004 and 2013. A screening of groundwater monitoring data against background concentrations and Federal maximum concentration levels was used to determine vadose zone

  2. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  3. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  4. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  5. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  6. Vulnerability Analysis of Energy Delivery Control Systems

    Broader source: Energy.gov (indexed) [DOE]

    ... Attackers can search for vulnerabilities in firewalls, ... organization, measured in terms of confidentiality, ... in which an adversary can enter the system and potentially ...

  7. US Energy Sector Vulnerabilities to Climate Change

    Broader source: Energy.gov (indexed) [DOE]

    Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND ... and International Affairs (DOE-PI) and the National Renewable Energy Laboratory (NREL). ...

  8. Assessment of national systems for obtaining local acceptance of waste management siting and routing activities

    SciTech Connect (OSTI)

    Paige, H.W.; Lipman, D.S.; Owens, J.E.

    1980-07-01

    There is a rich mixture of formal and informal approaches being used in our sister nuclear democracies in their attempts to deal with the difficulties of obtaining local acceptance for siting of waste management facilities and activities. Some of these are meeting with a degree of success not yet achieved in the US. Although this survey documents and assesses many of these approaches, time did not permit addressing in any detail their relevance to common problems in the US. It would appear the US could benefit from a periodic review of the successes and failures of these efforts, including analysis of their applicability to the US system. Of those countries (Germany, Sweden, Switzerland, Japan, Belgium, and the US) who are working to a time table for the preparation of a high-level waste (HLW) repository, Germany is the only country to have gained local siting acceptance for theirs. With this (the most difficult of siting problems) behind them they appear to be in the best overall condition relative to waste management progress and plans. This has been achieved without a particularly favorable political structure, made up for by determination on the part of the political leadership. Of the remaining three countries studied (France, UK and Canada) France, with its AVM production facility, is clearly the world leader in the HLW immobilization aspect of waste management. France, Belgium and the UK appear to have the least favorable political structures and environments for arriving at waste management decisions. US, Switzerland and Canada appear to have the least favorable political structures and environments for arriving at waste management decisions.

  9. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  10. MANAGEMENT OF RESEARCH AND TEST REACTOR ALUMINUM SPENT NUCLEAR FUEL - A TECHNOLOGY ASSESSMENT

    SciTech Connect (OSTI)

    Vinson, D.

    2010-07-11

    The Department of Energy's Environmental Management (DOE-EM) Program is responsible for the receipt and storage of aluminum research reactor spent nuclear fuel or used fuel until ultimate disposition. Aluminum research reactor used fuel is currently being stored or is anticipated to be returned to the U.S. and stored at DOE-EM storage facilities at the Savannah River Site and the Idaho Nuclear Technology and Engineering Center. This paper assesses the technologies and the options for safe transportation/receipt and interim storage of aluminum research reactor spent fuel and reviews the comprehensive strategy for its management. The U.S. Department of Energy uses the Appendix A, Spent Nuclear Fuel Acceptance Criteria, to identify the physical, chemical, and isotopic characteristics of spent nuclear fuel to be returned to the United States under the Foreign Research Reactor Spent Nuclear Fuel Acceptance Program. The fuel is further evaluated for acceptance through assessments of the fuel at the foreign sites that include corrosion damage and handleability. Transport involves use of commercial shipping casks with defined leakage rates that can provide containment of the fuel, some of which are breached. Options for safe storage include wet storage and dry storage. Both options must fully address potential degradation of the aluminum during the storage period. This paper focuses on the various options for safe transport and storage with respect to technology maturity and application.

  11. Management assessment of tank waste remediation system contractor readiness to proceed with phase 1B privatization

    SciTech Connect (OSTI)

    Honeyman, J.O.

    1998-01-09

    This Management Assessment of Tank Waste Remediation System (TWRS) Contractor Readiness to Proceed With Phase 1B Privatization documents the processes used to determine readiness to proceed with tank waste treatment technologies from private industry, now known as TWRS privatization. An overall systems approach was applied to develop action plans to support the retrieval and disposal mission of the TWRS Project. The systems and infrastructure required to support the mission are known. Required systems are either in place or plans have been developed to ensure they exist when needed. Since October 1996 a robust system engineering approach to establishing integrated Technical Baselines, work breakdown structures, tank farms organizational structure and configurations, work scope, and costs has become part of the culture within the TWRS Project. An analysis of the programmatic, management, and technical activities necessary to declare readiness to proceed with execution of the mission demonstrates that the system, personnel, and hardware will be on-line and ready to support the private contractors. The systems approach included defining the retrieval and disposal mission requirements and evaluating the readiness of the Project Hanford Management Contract (PHMC) team to support initiation of waste processing by the private contractors in June 2002 and to receive immobilized waste shortly thereafter. The Phase 1 feed delivery requirements from the private contractor Requests for Proposal were reviewed. Transfer piping routes were mapped, existing systems were evaluated, and upgrade requirements were defined.

  12. Joint Assessment of Renewable Energy and Water Desalination Research Center (REWDC) Program Capabilities and Facilities In Radioactive Waste Management

    SciTech Connect (OSTI)

    Bissani, M; Fischer, R; Kidd, S; Merrigan, J

    2006-04-03

    The primary goal of this visit was to perform a joint assessment of the Renewable Energy and Water Desalination Center's (REWDC) program in radioactive waste management. The visit represented the fourth technical and scientific interaction with Libya under the DOE/NNSA Sister Laboratory Arrangement. Specific topics addressed during the visit focused on Action Sheet P-05-5, ''Radioactive Waste Management''. The Team, comprised of Mo Bissani (Team Lead), Robert Fischer, Scott Kidd, and Jim Merrigan, consulted with REWDC management and staff. The team collected information, discussed particulars of the technical collaboration and toured the Tajura facility. The tour included the waste treatment facility, waste storage/disposal facility, research reactor facility, hot cells and analytical labs. The assessment team conducted the first phase of Task A for Action Sheet 5, which involved a joint assessment of the Radioactive Waste Management Program. The assessment included review of the facilities dedicated to the management of radioactive waste at the Tourja site, the waste management practices, proposed projects for the facility and potential impacts on waste generation and management.

  13. Assessment and management of aquatic impacts from airport de-icing activities -- The Canadian perspective

    SciTech Connect (OSTI)

    Kent, R.A.; Andersen, D.; Simpson, A.

    1995-12-31

    Historically, aircraft deicing fluids have simply drained from aircraft and runway surfaces into airport drainage systems and invariably end up in surrounding receiving aquatic systems. This led to recent concerns over environmental impacts from glycol-based fluids typically used for deicing aircraft. Glycols from de-icing fluids have been detected at high levels at Canadian airports. Concern not only stems from the high volumes being used at relatively few point sources, but also to the higher toxicity of the formulated de-icing fluids, compared to pure glycols. As a result, significant environmental management efforts have been made at Canadian airports over the last 4 years, including extensive stormwater monitoring, glycol mitigation and pollution prevention plans. Site-specific mitigation plans have been implemented at 15 major Canadian airports which typically include glycol containment, collection and removal. While a reasonable dataset is available on the toxicity of pure glycols, much less information is available on the toxicity of formulated deicers. Furthermore, there have been very few field assessments of the aquatic impacts of de-icing. To date, management regimes developed to address the problem in Canada have focused almost exclusively on glycols and voluntary compliance to discharge limits and receiving water quality guidelines. This approach has resulted in reductions in the quantities of glycols which are released from Canadian airports into the surrounding environment. Currently, government and industry are refining this management system with an examination of new approaches and options such as more holistic airport wastewater quality assessments and toxicity-based guidelines.

  14. Hawaii demand-side management resource assessment. Final report: DSM opportunity report

    SciTech Connect (OSTI)

    1995-08-01

    The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. 10 figs., 55 tabs.

  15. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  16. Management Challenges in Developing Performance Assessments and Effectively Communicating Their Results - 13612

    SciTech Connect (OSTI)

    Thomas, Steve; Mahoney, Mark

    2013-07-01

    The end of the Cold War has left a legacy of approximately 37 million gallons of radioactive waste in the aging waste tanks at the Department of Energy's Savannah River Site (SRS). A robust program is in place to remove waste from these tanks, treat the waste to separate into a relatively small volume of high level waste and a large volume of low-level waste, and to actively dispose of the low-level waste on-site and close the cleaned waste tanks and associated ancillary structures. To support performance-based, risk-informed decision making, performance assessments have been developed for the low-level waste disposal facility and for the SRS Tank Farms. Although these performance assessments share many similar features, the nature of the hazards and associated containments differ. As a management team, we are challenged to effectively communicate both the similarities and differences of these performance assessments, how they should be used to support sound decision making for treatment, disposal and waste tank cleaning decisions, and in defending their respective assumptions to the regulatory community and the public but, equally important, to our own corporate decision makers and operations personnel. Effective development and defense of these performance assessments, and effective interpretation and communication of the results are key to making cost-effective, pragmatic decisions for the safe disposal of the low-level waste and stabilization and operational closure of the cleaned tanks and associated structures. This paper will focus on the importance and challenges in communicating key attributes, conclusions and operational implications within a company. (authors)

  17. Assessment of medical waste management at a primary health-care center in Sao Paulo, Brazil

    SciTech Connect (OSTI)

    Moreira, A.M.M.; Guenther, W.M.R.

    2013-01-15

    Highlights: Black-Right-Pointing-Pointer Assessment of medical waste management at health-care center before/after intervention. Black-Right-Pointing-Pointer Qualitative and quantitative results of medical waste management plan are presented. Black-Right-Pointing-Pointer Adjustments to comply with regulation were adopted and reduction of waste was observed. Black-Right-Pointing-Pointer The method applied could be useful for similar establishments. - Abstract: According to the Brazilian law, implementation of a Medical Waste Management Plan (MWMP) in health-care units is mandatory, but as far as we know evaluation of such implementation has not taken place yet. The purpose of the present study is to evaluate the improvements deriving from the implementation of a MWMP in a Primary Health-care Center (PHC) located in the city of Sao Paulo, Brazil. The method proposed for evaluation compares the first situation prevailing at this PHC with the situation 1 year after implementation of the MWMP, thus allowing verification of the evolution of the PHC performance. For prior and post-diagnosis, the method was based on: (1) application of a tool (check list) which considered all legal requirements in force; (2) quantification of solid waste subdivided into three categories: infectious waste and sharp devices, recyclable materials and non-recyclable waste; and (3) identification of non-conformity practices. Lack of knowledge on the pertinent legislation by health workers has contributed to non-conformity instances. The legal requirements in force in Brazil today gave origin to a tool (check list) which was utilized in the management of medical waste at the health-care unit studied. This tool resulted into an adequate and simple instrument, required a low investment, allowed collecting data to feed indicators and also conquered the participation of the unit whole staff. Several non-conformities identified in the first diagnosis could be corrected by the instrument utilized

  18. Radioactive Waste Management Complex low-level waste radiological performance assessment

    SciTech Connect (OSTI)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  19. Dose assessment for management alternatives for NORM-contaminated equipment within the petroleum industry

    SciTech Connect (OSTI)

    Blunt, D.L.; Smith, K.P.

    1995-08-01

    The contamination of drilling and production equipment by naturally occurring radioactive material (NORM) is a growing concern for the petroleum industry and regulators. Large volumes of NORM-contaminated scrap metal are generated by the industry each year. The contamination generally occurs as surface contamination on the interior of water-handling equipment. The source of this contamination is accumulation of by-product wastes, in the form of scale and sludge contaminated with NORM that are generated by extraction processes. The primary radionuclides of concern in petroleum industry NORM-wastes are radium-226 (Ra-226), and radium-228 (Ra-228). These isotopes are members of the uranium-238 and thorium-232 decay series, respectively. The uranium and thorium isotopes, which are naturally present in the subsurface formations from which hydrocarbons are extracted, are largely immobile and remain in the subsurface. The more soluble radium can become mobilized in the formation water and be transported to the surface in the produced water waste stream. The radium either remains in solution or precipitates in scale or sludge deposits, depending on water salinity and on temperature and pressure phase changes. NORM-containing scale consists of radium that has coprecipitated with barium, calcium, or strontium sulfates, and sludge typically consists of radium-containing silicates and carbonates. This assessment is limited to the evaluation of potential radiological doses from management options that specifically involve recycle and reuse of contaminated metal. Doses from disposal of contaminated equipment are not addressed. Radiological doses were estimated for workers and the general public for equipment decontamination and smelting. Results of this assessment can be used to examine policy issues concerning the regulation and management of NORM-contaminated wastes generated by the petroleum industry.

  20. Subsidence vulnerability in shallow room-and-pillar mines

    SciTech Connect (OSTI)

    Missavage, R.

    1985-07-01

    Concern over mining-related subsidence is inhibiting the development of surface land uses in previously mined areas and is constraining the recovery of coal resources in areas with established land uses that might be impacted by subsequent subsidence. The determination of subsidence vulnerability of mined-out areas (especially abandoned mine areas) can be a useful tool in the design and location of surface structures. A model has been developed for assessing subsidence vulnerability in shallow room-and-pillar mines based on the flexural rigidity and strength characteristics of the overlying strata. The model does not predict the subsidence profile or when the subsidence will occur. It only predicts those areas that are likely to subside. This paper briefly describes the model and its testing.

  1. Pollution prevention opportunity assessment for the SNL/California waste management facilities

    SciTech Connect (OSTI)

    Braye, S.; Phillips, N.M.

    1995-01-01

    SNL/California`s waste management facilities, Bldgs. 961 and 962-2, generate a secondary stream of hazardous and radioactive waste. This waste stream is generated mainly during the processing and handling of hazardous, radioactive, and mixed wastes (primary waste stream), which are generated by the laboratories, and when cleaning up spills. The secondary waste stream begins with the removal of a generator`s hazardous, radioactive, and mixed waste from specified collection areas. The waste stream ends when the containers of processed waste are loaded for shipment off-site. The total amount of secondary hazardous waste generated in the waste management facilities from January 1993 to July 1994 was 1,160.6 kg. The total amount of secondary radioactive waste generated during the same period was 1,528.8 kg (with an activity of 0.070 mCi). Mixed waste usually is not generated in the secondary waste stream. This pollution prevention opportunity assessment (PPOA) was conducted using the graded approach methodology developed by the Department of Energy (DOE) PPOA task group. The original method was modified to accommodate the needs of Sandia`s site-specific processes. The options generated for potential hazardous waste minimization, cost savings, and environmental health and safety were the result of a waste minimization team effort. The results of the team efforts are summarized.

  2. Assessment of thermal analysis software for the DOE Office of Civilian Radioactive Waste Management

    SciTech Connect (OSTI)

    Williams, P.T.; Graham, R.F.; Lagerberg, G.N.; Chung, T.C.

    1989-07-01

    This assessment uses several recent assessments and the more general code compilations that have been completed to produce a list of 116 codes that can be used for thermal analysis. This list is then compared with criteria prepared especially for the Department of Energy Office of Civilian Radioactive Waste Management (DOE/OCRWM). Based on these criteria, fifteen codes are narrowed to three primary codes and four secondary codes for use by the OCRWM thermal analyst. The analyst is cautioned that since no single code is sufficient for all applications, a code must be selected based upon the predominate heat transfer mode of the problem to be solved, but the codes suggested in this report have been used successfully for a range of OCRWM applications. The report concludes with a series of recommendations for additional work of which the major points include the following: The codes suggested by this report must be benchmarked with the existing US and international problems and validated when possible; An interactive code selection tool could be developed or, perhaps even more useful, a users group could be supported to ensure the proper selection of thermal codes and dissemination of information on the latest version; The status of the 116 codes identified by this report should be verified, and methods for maintaining the still active codes must be established; and special capabilities of each code in phase change, convection and radiation should be improved to better enable the thermal analyst to model OCRWM applications. 37 refs., 3 figs., 12 tabs.

  3. Preliminary Performance Assessment for the Waste Management Area C at the Hanford Site in Southeast Washington

    SciTech Connect (OSTI)

    Bergeron, Marcel P.; Singleton, Kristin M.; Eberlein, Susan J.

    2015-01-07

    A performance assessment (PA) of Single-Shell Tank (SST) Waste Management Area C (WMA C) located at the U.S. Department of Energy's (DOE) Hanford Site in southeastern Washington is being conducted to satisfy the requirements of the Hanford Federal Facility Agreement and Consent Order (HFFACO), as well as other Federal requirements and State-approved closure plans and permits. The WMP C PA assesses the fate, transport, and impacts of radionuclides and hazardous chemicals within residual wastes left in tanks and ancillary equipment and facilities in their assumed closed configuration and the subsequent risks to humans into the far future. The part of the PA focused on radiological impacts is being developed to meet the requirements for a closure authorization under DOE Order 435.1 that includes a waste incidental to reprocessing determination for residual wastes remaining in tanks, ancillary equipment, and facilities. An additional part of the PA will evaluate human health and environmental impacts from hazardous chemical inventories in residual wastes remaining in WMA C tanks, ancillary equipment, and facilities needed to meet the requirements for permitted closure under RCRA.

  4. One size fits all? An assessment tool for solid waste management at local and national levels

    SciTech Connect (OSTI)

    Broitman, Dani; Ayalon, Ofira; Kan, Iddo

    2012-10-15

    Highlights: Black-Right-Pointing-Pointer Waste management schemes are generally implemented at national or regional level. Black-Right-Pointing-Pointer Local conditions characteristics and constraints are often neglected. Black-Right-Pointing-Pointer We developed an economic model able to compare multi-level waste management options. Black-Right-Pointing-Pointer A detailed test case with real economic data and a best-fit scenario is described. Black-Right-Pointing-Pointer Most efficient schemes combine clear National directives with local level flexibility. - Abstract: As environmental awareness rises, integrated solid waste management (WM) schemes are increasingly being implemented all over the world. The different WM schemes usually address issues such as landfilling restrictions (mainly due to methane emissions and competing land use), packaging directives and compulsory recycling goals. These schemes are, in general, designed at a national or regional level, whereas local conditions and constraints are sometimes neglected. When national WM top-down policies, in addition to setting goals, also dictate the methods by which they are to be achieved, local authorities lose their freedom to optimize their operational WM schemes according to their specific characteristics. There are a myriad of implementation options at the local level, and by carrying out a bottom-up approach the overall national WM system will be optimal on economic and environmental scales. This paper presents a model for optimizing waste strategies at a local level and evaluates this effect at a national level. This is achieved by using a waste assessment model which enables us to compare both the economic viability of several WM options at the local (single municipal authority) level, and aggregated results for regional or national levels. A test case based on various WM approaches in Israel (several implementations of mixed and separated waste) shows that local characteristics significantly

  5. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java ...

  6. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability...

  7. Utilizing Semantic Big Data for realizing a National-scale Infrastructure Vulnerability Analysis System

    SciTech Connect (OSTI)

    Chinthavali, Supriya; Shankar, Mallikarjun

    2016-01-01

    Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph, (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.

  8. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  9. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  10. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  11. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Energy Savers [EERE]

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  12. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  13. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  14. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  15. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  16. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  17. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  18. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  19. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  20. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  1. WM2014 Conference- Building the Community of Practice for Performance and Risk Assessment in Support of Risk-Informed Environmental Management Decisions

    Broader source: Energy.gov [DOE]

    WM2014 Conference - Building the Community of Practice for Performance and Risk Assessment in Support of Risk-Informed Environmental Management Decisions - 14575

  2. Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site

    SciTech Connect (OSTI)

    NSTec Radioactive Waste

    2010-10-12

    Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products.

  3. RCRA Assessment Plan for Single-Shell Tank Waste Management Area TX-TY at the Hanford Site

    SciTech Connect (OSTI)

    Hodges, Floyd N.; Chou, Charissa J.

    2001-02-23

    A groundwater quality assessment plan was prepared to investigate the rate and extent of aquifer contamination beneath Waste Management Area TX-TY on the Hanford Site in Washington State. This plan is an update of a draft plan issued in February 1999, which guided work performed in fiscal year 2000.

  4. Environmental assessment for the Radioactive and Mixed Waste Management Facility: Sandia National Laboratories/New Mexico

    SciTech Connect (OSTI)

    Not Available

    1993-06-01

    The Department of Energy (DOE) has prepared an environmental assessment (EA) (DOE/EA-0466) under the National Environmental Policy Act (NEPA) of 1969 for the proposed completion of construction and subsequent operation of a central Radioactive and Mixed Waste Management Facility (RMWMF), in the southeastern portion of Technical Area III at Sandia National Laboratory, Albuquerque (SNLA). The RMWMF is designed to receive, store, characterize, conduct limited bench-scale treatment of, repackage, and certify low-level waste (LLW) and mixed waste (MW) (as necessary) for shipment to an offsite disposal or treatment facility. The RMWMF was partially constructed in 1989. Due to changing regulatory requirements, planned facility upgrades would be undertaken as part of the proposed action. These upgrades would include paving of road surfaces and work areas, installation of pumping equipment and lines for surface impoundment, and design and construction of air locks and truck decontamination and water treatment systems. The proposed action also includes an adjacent corrosive and reactive metals storage area, and associated roads and paving. LLW and MW generated at SNLA would be transported from the technical areas to the RMWMF in containers approved by the Department of Transportation. The RMWMF would not handle nonradioactive hazardous waste. Based on the analysis in the EA, the proposed completion of construction and operation of the RMWMF does not constitute a major Federal action significantly affecting the quality of the human environment within the meaning of NEPA. Therefore, preparation of an environmental impact statement for the proposed action is not required.

  5. Pilot study risk assessment for selected problems at the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Hamilton, L.D.; Meinhold, A.F.; Baxter, S.L.; Holtzman, S.; Morris, S.C.; Pardi, R.; Rowe, M.D.; Sun, C.; Anspaugh, L.; Layton, D.

    1993-03-01

    Two important environmental problems at the USDOE Fernald Environmental Management Project (FEMP) facility in Fernald, Ohio were studied in this human health risk assessment. The problems studied were radon emissions from the K-65 waste silos, and offsite contamination of ground water with uranium. Waste from the processing of pitchblende ore is stored in the K-65 silos at the FEMP. Radium-226 in the waste decays to radon gas which escapes to the outside atmosphere. The concern is for an increase in lung cancer risk for nearby residents associated with radon exposure. Monitoring data and a gaussian plume transport model were used to develop a source term and predict exposure and risk to fenceline residents, residents within 1 and 5 miles of the silos, and residents of Hamilton and Cincinnati, Ohio. Two release scenarios were studied: the routine release of radon from the silos and an accidental loss of one silo dome integrity. Exposure parameters and risk factors were described as distributions. Risks associated with natural background radon concentrations were also estimated.

  6. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  7. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  8. Burlington Bottoms Wildlife Mitigation Project. Final Environmental Assessment/Management Plan and Finding of No Significant Impact.

    SciTech Connect (OSTI)

    Not Available

    1994-12-01

    Bonneville Power Administration (BPA) proposes to fund wildlife management and enhancement activities for the Burlington bottoms wetlands mitigation site. Acquired by BPA in 1991, wildlife habitat at Burlington bottoms would contribute toward the goal of mitigation for wildlife losses and inundation of wildlife habitat due to the construction of Federal dams in the lower Columbia and Willamette River Basins. Target wildlife species identified for mitigation purposes are yellow warbler, great blue heron, black-capped chickadee, red-tailed hawk, valley quail, spotted sandpiper, wood duck, and beaver. The Draft Management Plan/Environmental Assessment (EA) describes alternatives for managing the Burlington Bottoms area, and evaluates the potential environmental impacts of the alternatives. Included in the Draft Management Plan/EA is an implementation schedule, and a monitoring and evaluation program, both of which are subject to further review pending determination of final ownership of the Burlington Bottoms property.

  9. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  10. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  11. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K.; Peters, Scott

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  12. Petroleum Resource Management and Assessment project for the Western Siberian Administration Russia. TDA feasibility study. Export trade information

    SciTech Connect (OSTI)

    Not Available

    1993-01-01

    The objective of the study is: (1) To determine the nature and availability of the information necessary for Resource Assessment in oil fields to be open to foreign investment; (2) To determine what resources are required to implement the 'Alberta Model' of Resource Management in Siberia; (3) To establish a pilot Data Collection and Information System, including software, hardware and technology; (4) To indicate whether the studied database model and related software can meet Russia's long term requirements for information management in the petroleum sector; (5) The transfer of information techniques to the Russian implementation teams; and (6) To define the requirements for a resource/economic study.

  13. Attachment J-16 Portfolio Management Task Order 13-002 Title: DOE-HQ Security System Review and Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Section J Contract No. DE-AC06-09RL14728 Modification 280 Attachment J-16 Portfolio Management Task Order 13-002 Title: DOE-HQ Security System Review and Assessment Revision Number: 0 Date: 04/11/2013 Start: 05/01/2013 Finish: 07/30/2013 1.0 DESCRIPTION The DOE Office of Environmental Management (EM) Headquarters Security System (HQSS) is installed at the EM Consolidated Business Center (CBC) in Cincinnati, OH and administered from DOE Headquarters in Washington, DC. HQSS has been running as a

  14. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  15. Hawaii demand-side management resource assessment. Final report, Reference Volume 1: Building prototype analysis

    SciTech Connect (OSTI)

    1995-04-01

    This report provides a detailed description of, and the baseline assumptions and simulation results for, the building prototype simulations conducted for the building types designated in the Work Plan for Demand-side Management Assessment of Hawaii`s Demand-Side Resources (HES-4, Phase 2). This report represents the second revision to the initial building prototype description report provided to DBEDT early in the project. Modifications and revisions to the prototypes, based on further calibration efforts and on comments received from DBEDT Staff have been incorporated into this final version. These baseline prototypes form the basis upon which the DSM measure impact estimates and the DSM measure data base were developed for this project. This report presents detailed information for each of the 17 different building prototypes developed for use with the DOE-21E program (23 buildings in total, including resorts and hotels defined separately for each island) to estimate the impact of the building technologies and measures included in this project. The remainder of this section presents some nomenclature and terminology utilized in the reports, tables, and data bases developed from this project to denote building type and vintage. Section 2 contains a more detailed discussion of the data sources, the definition of the residential sector building prototypes, and results of the DOE-2 analysis. Section 3 provides a similar discussion for the commercial sector. The prototype and baseline simulation results are presented in a separate section for each building type. Where possible, comparison of the baseline simulation results with benchmark data from the ENERGY 2020 model or other demand forecasting models specific to Hawaii is included for each building. Appendix A contains a detailed listing of the commercial sector baseline indoor lighting technologies included in the existing and new prototypes by building type.

  16. Groundwater quality assessment plan for single-shell waste management area B-BX-BY at the Hanford Site

    SciTech Connect (OSTI)

    SM Narbutovskih

    2000-03-31

    Pacific Northwest National Laboratory conducted a first determination groundwater quality assessment at the Hanford Site. This work was performed for the US Department of Energy, Richland Operations Office, in accordance with the Federal Facility Compliance Agreement during the time period 1996--1998. The purpose of the assessment was to determine if waste from the Single-Shell Tank (SST) Waste Management Area (WMA) B-BX-BY had entered the groundwater at levels above the drinking water standards (DWS). The resulting assessment report documented evidence demonstrating that waste from the WMA has, most likely, impacted groundwater quality. Based on 40 CFR 265.93 [d] paragraph (7), the owner-operator must continue to make the minimum required determinations of contaminant level and of rate/extent of migrations on a quarterly basis until final facility closure. These continued determinations are required because the groundwater quality assessment was implemented prior to final closure of the facility.

  17. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  18. RCRA Assessment Plan for Single-Shell Tank Waste Management Area T

    SciTech Connect (OSTI)

    Horton, Duane G.

    2006-01-15

    This plan describes the data quality objectives process used to guide information gathering to further the assessment at WMA T.

  19. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  20. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  1. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  2. Modeling Vulnerability and Resilience to Climate Change: A Case Study of India and Indian States

    SciTech Connect (OSTI)

    Brenkert, Antoinette L.; Malone, Elizabeth L.

    2005-09-01

    The vulnerability of India and Indian states to climate change was assessed using the Vulnerability-Resilience Indicator Prototype (VRIP). The model was adapted from the global/country version to account for Indian dietary practices and data availability with regard to freshwater resources. Results (scaled to world values) show nine Indian states to be moderately resilient to climate change, principally because of low sulfur emissions and a relatively large percentage of unmanaged land. Six states are more vulnerable than India as a whole, attributable largely to sensitivity to sea storm surges. Analyses of results at the state level (Orissa, and comparisons between Maharashtra and Kerala, and Andhra Pradesh and Himachal Pradesh) demonstrate the value of VRIP analyses used in conjunction with other socioeconomic information to address initial questions about the sources of vulnerability in particular places. The modeling framework allows analysts and stakeholders to systematically evaluate individual and sets of indicators and to indicate where the likely vulnerabilities are in the area being assessed.

  3. Multi-criteria evaluation in strategic environmental assessment for waste management plan, a case study: The city of Belgrade

    SciTech Connect (OSTI)

    Josimović, Boško Marić, Igor; Milijić, Saša

    2015-02-15

    Highlights: • The paper deals with the specific method of multi-criteria evaluation applied in drafting the SEA for the Belgrade WMP. • MCE of the planning solutions, assessed according to 37 objectives of the SEA and four sets of criteria, was presented in the matrix form. • The results are presented in the form of graphs so as to be easily comprehensible to all the participants in the decision-making process. • The results represent concrete contribution proven in practice. - Abstract: Strategic Environmental Assessment (SEA) is one of the key instruments for implementing sustainable development strategies in planning in general; in addition to being used in sectoral planning, it can also be used in other areas such as waste management planning. SEA in waste management planning has become a tool for considering the benefits and consequences of the proposed changes in space, also taking into account the capacity of space to sustain the implementation of the planned activities. In order to envisage both the positive and negative implications of a waste management plan for the elements of sustainable development, an adequate methodological approach to evaluating the potential impacts must be adopted and the evaluation results presented in a simple and clear way, so as to allow planners to make relevant decisions as a precondition for the sustainability of the activities planned in the waste management sector. This paper examines the multi-criteria evaluation method for carrying out an SEA for the Waste Management Plan for the city of Belgrade (BWMP). The method was applied to the evaluation of the impacts of the activities planned in the waste management sector on the basis of the environmental and socioeconomic indicators of sustainability, taking into consideration the intensity, spatial extent, probability and frequency of impact, by means of a specific planning approach and simple and clear presentation of the obtained results.

  4. Enterprise Assessments Lessons Learned from Targeted Reviews of the Management of Safety Systems at U.S. Department of Energy Nuclear Facilities … April 2016

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Targeted Reviews of the Management of Safety Systems at U.S. Department of Energy Nuclear Facilities April 2016 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  5. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

    P...

  6. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  7. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 45: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1

  8. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw Industries

    Broader source: Energy.gov [DOE]

    This case study details how a DOE energy assessment helped Shaw Industries identify significant energy savings opportunities in their Dalton, Georgia, plant's steam system.

  9. RCRA Assessment Plan for Single-Shell Tank Waste Management Area S-SX at the Hanford Site

    SciTech Connect (OSTI)

    Chou, C.J.; Johnson, V.G.

    1999-10-06

    A groundwater quality assessment plan was prepared for waste management area S-SX at the Hanford Site. Groundwater monitoring is conducted at this facility in accordance with Title 40, Code of Federal Regulation (CFR) Part 265, Subpart F [and by reference of Washington Administrative Code (WAC) 173-303-400(3)]. The facility was placed in assessment groundwater monitoring program status after elevated waste constituents and indicator parameter measurements (i.e., chromium, technetium-99 and specific conductance) in downgradient monitoring wells were observed and confirmed. A first determination, as allowed under 40 CFR 265.93(d), provides the owner/operator of a facility an opportunity to demonstrate that the regulated unit is not the source of groundwater contamination. Based on results of the first determination it was concluded that multiple source locations in the waste management area could account for observed spatial and temporal groundwater contamination patterns. Consequently, a continued investigation is required. This plan, developed using the data quality objectives process, is intended to comply with the continued investigation requirement. Accordingly, the primary purpose of the present plan is to determine the rate and extent of dangerous waste (hexavalent chromium and nitrate) and radioactive constituents (e.g., technetium-99) in groundwater and to determine their concentrations in groundwater beneath waste management area S-SX. Comments and concerns expressed by the Washington State Department of Ecology on the initial waste management area S-SX assessment report were addressed in the descriptive narrative of this plan as well as in the planned activities. Comment disposition is documented in a separate addendum to this plan.

  10. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  11. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  12. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  13. Taxonomy for Common-Cause Failure Vulnerability and Mitigation

    SciTech Connect (OSTI)

    Wood, Richard Thomas; Korsah, Kofi; Mullens, James Allen; Pullum, Laura L.

    2015-09-01

    CCF vulnerability and the suitability of mitigation techniques. Development of an effective CCF taxonomy will help to provide a framework for establishing the objective analysis and assessment capabilities desired to facilitate rigorous identification of fault types and triggers that are the fundamental elements of CCF.

  14. Vulnerability Analysis of Energy Delivery Control Systems (September 2011)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides recommendations for vendors and owners of those systems to identify and reduce those risks. Vulnerability Analysis of Energy Delivery Control Systems (September 2011) (2.69 MB)

  15. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  16. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: IBM Lotus Expeditor Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities June 25, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus Expeditor. PLATFORM: IBM Lotus Expeditor 6.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.. Reference Links: Vendor Advisory

  17. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  18. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  19. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  20. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  1. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  2. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  3. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  4. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  5. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  6. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    On the cover: Trans-Alaska oil pipeline; aerial view of New Jersey refinery; coal barges on Mississippi River in St. Paul, Minnesota; power plant in Prince George's County, Maryland; Grand Coulee Dam in Washington State; corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This report was drafted by the U.S. Department of Energy's Office of Policy and International Affairs

  7. RCRA Assessment Plan for Single-Shell Tank Waste Management Area B-BX-BY at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, Susan M.

    2006-09-29

    This document was prepared as a groundwater quality assessment plan revision for the single-shell tank systems in Waste Management Area B-BX-BY at the Hanford Site. Groundwater monitoring is conducted at this facility in accordance with 40 CFR Part 265, Subpart F. In FY 1996, the groundwater monitoring program was changed from detection-level indicator evaluation to a groundwater quality assessment program when elevated specific conductance in downgradient monitoring well 299 E33-32 was confirmed by verification sampling. During the course of the ensuing investigation, elevated technetium-99 and nitrate were observed above the drinking water standard at well 299-E33-41, a well located between 241-B and 241-BX Tank Farms. Earlier observations of the groundwater contamination and tank farm leak occurrences combined with a qualitative analysis of possible solutions, led to the conclusion that waste from the waste management area had entered the groundwater and were observed in this well. Based on 40 CFR 265.93 [d] paragraph (7), the owner-operator must continue to make the minimum required determinations of contaminant level and rate/extent of migrations on a quarterly basis until final facility closure. These continued determinations are required because the groundwater quality assessment was implemented prior to final closure of the facility.

  8. A Climate Change Vulnerability Assessment Report for the National...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... NWTC National Wind Technology Center PEMP Performance Evaluation and Measurement ... 2014 Annual Plan and Performance Evaluation and Measurement Plan (PEMP) goals (NREL 2014). ...

  9. Using social network and stakeholder analysis to help evaluate infectious waste management: A step towards a holistic assessment

    SciTech Connect (OSTI)

    Caniato, Marco; Vaccari, Mentore; Visvanathan, Chettiyappan; Zurbrgg, Christian

    2014-05-01

    Highlights: Assessment of infectious waste management in Bangkok, in particular incineration. Integration of social network and stakeholder analysis assessment methods. Assessment of stakeholder characteristics, role, interaction and communication. Interviewees self-evaluate their own characteristics and the system. Non-technical aspects are important for system acceptability, and sustainability. - Abstract: Assessing the strengths and weaknesses of a solid waste management scheme requires an accurate analysis and integration of several determining features. In addition to the technical aspects, any such system shows a complex interaction of actors with varying stakes, decision-making power and influence, as well as a favourable or disabling environment. When capitalizing on the knowledge and experience from a specific case, it is also crucial that experts do not forget or underestimate the importance of such social determinants and that they are familiar with the methods and tools to assess them. Social network analysis (SNA) and stakeholder analysis (SA) methods can be successfully applied to better understand actors role and actions, analyse driving forces and existing coordination among stakeholders, as well as identify bottlenecks in communication which affect daily operations or strategic planning for the future way forward. SNA and SA, appropriately adjusted for a certain system, can provide a useful integration to methods by assessing other aspects to ensure a comprehensive picture of the situation. This paper describes how to integrate SNA and SA in order to survey a solid waste management system. This paper presents the results of an analysis of On-Nuch infectious waste incinerator in Bangkok, Thailand. Stakeholders were interviewed and asked to prioritize characteristics and relationships which they consider particularly important for system development and success of the scheme. In such a way, a large quantity of information about

  10. Program management assessment of Federal Facility Compliance Agreement regarding CAA-40 C.F.R. Part 61, Subpart H at the Los Alamos National Laboratory

    SciTech Connect (OSTI)

    1997-01-01

    An assessment of Los Alamos National Laboratory`s management system related to facility compliance with an element of the Clean Air Act was performed under contract by a team from Northern Arizona University. More specifically, a Federal Facilities Compliance Agreement (FFCA) was established in 1996 to bring the Laboratory into compliance with emissions standards of radionuclides, commonly referred to as Rad/NESHAP. In the fall of 1996, the four-person team of experienced environmental managers evaluated the adequacy of relevant management systems to implement the FFCA provisions. The assessment process utilized multiple procedures including document review, personnel interviews and re-interviews, and facility observations. The management system assessment was completed with a meeting among team members, Laboratory officials and others on November 1, 1996 and preparation of an assessment report.

  11. Valero: Houston Refinery Uses Plant-Wide Assessment to Develop an Energy Optimization and Management System

    SciTech Connect (OSTI)

    2005-08-01

    This Industrial Technologies Program case study describes an energy assessment team's recommendations for saving $5 million in energy, water, and other costs at an oil refinery in Houston, Texas.

  12. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, Pamela D.

    1999-12-31

    This report presents the results from the analysis of the 51st set of environmental quality assessment samples (QAP-LI) that were received on or before December 2, 1999.

  13. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, Pamela D.; Berne, Anna

    2000-06-30

    This report presents the results from the analysis of the 52nd set of environmental quality assessment samples (QAP-LII) that were received on or before June 3, 2000.

  14. Waste management health risk assessment: A case study of a solid waste landfill in South Italy

    SciTech Connect (OSTI)

    Davoli, E.; Fattore, E.; Paiano, V.; Colombo, A.; Palmiotto, M.; Rossi, A.N.; Il Grande, M.; Fanelli, R.

    2010-08-15

    An integrated risk assessment study has been performed in an area within 5 km from a landfill that accepts non hazardous waste. The risk assessment was based on measured emissions and maximum chronic population exposure, for both children and adults, to contaminated air, some foods and soil. The toxic effects assessed were limited to the main known carcinogenic compounds emitted from landfills coming both from landfill gas torch combustion (e.g., dioxins, furans and polycyclic aromatic hydrocarbons, PAHs) and from diffusive emissions (vinyl chloride monomer, VCM). Risk assessment has been performed both for carcinogenic and non-carcinogenic effects. Results indicate that cancer and non-cancer effects risk (hazard index, HI) are largely below the values accepted from the main international agencies (e.g., WHO, US EPA) and national legislation ( and ).

  15. Supplemnental Volume - Independent Oversight Assessment of the Nuclear Safety Culture and Management of Nuclear Safety Concerns at the Hanford Site Waste Treatment and Immobilization Plant, January 2012

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Supplemental Volume Independent Oversight Assessment of Nuclear Safety Culture and Management of Nuclear Safety Concerns at the Hanford Site Waste Treatment and Immobilization Plant January 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy Office of Health, Safety and Security HSS i Independent Oversight Assessment of Safety Culture and Management of Nuclear Safety Concerns at the Hanford Site Waste Treatment and Immobilization Plant

  16. Integrated dynamic policy management methodology and system for strategic environmental assessment of golf course installation policy in Taiwan

    SciTech Connect (OSTI)

    Chen, Ching-Ho; Liu, Wei-Lin; Liaw, Shu-Liang

    2011-01-15

    Strategic environmental assessment (SEA) focuses primarily on assessing how policies, plans, and programs (PPPs) influence the sustainability of the involved regions. However, the processes of assessing policies and developing management strategies for pollution load and resource use are usually separate in the current SEA system. This study developed a policy management methodology to overcome the defects generated during the above processes. This work first devised a dynamic management framework using the methods of systems thinking, system dynamics, and Managing for Results (MFRs). Furthermore, a driving force-pressure-state-impact-response (DPSIR) indicator system was developed. The golf course installation policy was applied as a case study. Taiwan, counties of Taiwan, and the golf courses within those individual counties were identified as a system, subsystems, and objects, respectively. This study identified an object-linked double-layer framework with multi-stage-option to simultaneously to quantify golf courses in each subsystem and determine ratios of abatement and allocation for pollution load and resource use of each golf course. The DPSIR indicator values for each item of each golf course in each subsystem are calculated based on the options taken in the two decision layers. The summation of indicator values for all items of all golf courses in all subsystems according to various options is defined as the sustainability value of the policy. An optimization model and a system (IDPMS) were developed to obtain the greatest sustainability value of the policy, while golf course quantity, human activity intensity, total quantities of pollution load and resource use are simultaneously obtained. The solution method based on enumeration of multiple bounds for objectives and constraints (EMBOC) was developed for the problem with 1.95 x 10{sup 128} combinations of possible options to solve the optimal solution in ten minutes using a personal computer with 3.0 GHz

  17. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  18. U-116: IBM Tivoli Provisioning Manager Express for Software Distributi...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for the affected ActiveX control Addthis Related Articles V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-094: IBM Multiple Products Multiple...

  19. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  20. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  1. Industrial Assessment Center Program Helps Veterans Learn Valuable Energy Management Skills

    Broader source: Energy.gov [DOE]

    U.S. soldiers are participating in an Energy Department supported program that provides hands-on education for #engineering #jobs. The Industrial Assessment Center (IAC) program, is open to all engineering students at participating colleges and universities, but many veterans find that they can use the program to further develop many skills they obtained through their service.

  2. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw Industries

    SciTech Connect (OSTI)

    2008-07-01

    The Shaw Industries carpet manufacturing plant #20 in Dalton, Georgia, optimized boiler operation and installed waste heat exchangers on two processes in the dye house and an economizer on one boiler, for a payback of 1.7 years. These results prompted plant #4, also located in Dalton, to participate in an assessment.

  3. Seismic Vulnerability Evaluations Within The Structural And Functional Survey Activities Of The COM Bases In Italy

    SciTech Connect (OSTI)

    Zuccaro, G.; Cacace, F.; Albanese, V.; Mercuri, C.; Papa, F.; Pizza, A. G.; Sergio, S.; Severino, M.

    2008-07-08

    The paper describes technical and functional surveys on COM buildings (Mixed Operative Centre). This activity started since 2005, with the contribution of both Italian Civil Protection Department and the Regions involved. The project aims to evaluate the efficiency of COM buildings, checking not only structural, architectonic and functional characteristics but also paying attention to surrounding real estate vulnerability, road network, railways, harbours, airports, area morphological and hydro-geological characteristics, hazardous activities, etc. The first survey was performed in eastern Sicily, before the European Civil Protection Exercise 'EUROSOT 2005'. Then, since 2006, a new survey campaign started in Abruzzo, Molise, Calabria and Puglia Regions. The more important issue of the activity was the vulnerability assessment. So this paper deals with a more refined vulnerability evaluation technique by means of the SAVE methodology, developed in the 1st task of SAVE project within the GNDT-DPC programme 2000-2002 (Zuccaro, 2005); the SAVE methodology has been already successfully employed in previous studies (i.e. school buildings intervention programme at national scale; list of strategic public buildings in Campania, Sicilia and Basilicata). In this paper, data elaborated by SAVE methodology are compared with expert evaluations derived from the direct inspections on COM buildings. This represents a useful exercise for the improvement either of the survey forms or of the methodology for the quick assessment of the vulnerability.

  4. A program-level management system for the life cycle environmental and economic assessment of complex building projects

    SciTech Connect (OSTI)

    Kim, Chan-Joong; Kim, Jimin; Hong, Taehoon; Koo, Choongwan; Jeong, Kwangbok; Park, Hyo Seon

    2015-09-15

    Climate change has become one of the most significant environmental issues, of which about 40% come from the building sector. In particular, complex building projects with various functions have increased, which should be managed from a program-level perspective. Therefore, this study aimed to develop a program-level management system for the life-cycle environmental and economic assessment of complex building projects. The developed system consists of three parts: (i) input part: database server and input data; (ii) analysis part: life cycle assessment and life cycle cost; and (iii) result part: microscopic analysis and macroscopic analysis. To analyze the applicability of the developed system, this study selected ‘U’ University, a complex building project consisting of research facility and residential facility. Through value engineering with experts, a total of 137 design alternatives were established. Based on these alternatives, the macroscopic analysis results were as follows: (i) at the program-level, the life-cycle environmental and economic cost in ‘U’ University were reduced by 6.22% and 2.11%, respectively; (ii) at the project-level, the life-cycle environmental and economic cost in research facility were reduced 6.01% and 1.87%, respectively; and those in residential facility, 12.01% and 3.83%, respective; and (iii) for the mechanical work at the work-type-level, the initial cost was increased 2.9%; but the operation and maintenance phase was reduced by 20.0%. As a result, the developed system can allow the facility managers to establish the operation and maintenance strategies for the environmental and economic aspects from a program-level perspective. - Highlights: • A program-level management system for complex building projects was developed. • Life-cycle environmental and economic assessment can be conducted using the system. • The design alternatives can be analyzed from the microscopic perspective. • The system can be used to

  5. Life cycle assessment of urban waste management: Energy performances and environmental impacts. The case of Rome, Italy

    SciTech Connect (OSTI)

    Cherubini, Francesco Bargigli, Silvia; Ulgiati, Sergio

    2008-12-15

    Landfilling is nowadays the most common practice of waste management in Italy in spite of enforced regulations aimed at increasing waste pre-sorting as well as energy and material recovery. In this work we analyse selected alternative scenarios aimed at minimizing the unused material fraction to be delivered to the landfill. The methodological framework of the analysis is the life cycle assessment, in a multi-method form developed by our research team. The approach was applied to the case of municipal solid waste (MSW) management in Rome, with a special focus on energy and material balance, including global and local scale airborne emissions. Results, provided in the form of indices and indicators of efficiency, effectiveness and environmental impacts, point out landfill activities as the worst waste management strategy at a global scale. On the other hand, the investigated waste treatments with energy and material recovery allow important benefits of greenhouse gas emission reduction (among others) but are still affected by non-negligible local emissions. Furthermore, waste treatments leading to energy recovery provide an energy output that, in the best case, is able to meet 15% of the Rome electricity consumption.

  6. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  7. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  8. Life cycle assessment of integrated waste management systems for alternative legacy scenarios of the London Olympic Park

    SciTech Connect (OSTI)

    Parkes, Olga Lettieri, Paola Bogle, I. David L.

    2015-06-15

    Highlights: • Application of LCA in planning integrated waste management systems. • Environmental valuation of 3 legacy scenarios for the Olympic Park. • Hot-spot analysis highlights the importance of energy and materials recovery. • Most environmental savings are achieved through materials recycling. • Sensitivity analysis shows importance of waste composition and recycling rates. - Abstract: This paper presents the results of the life cycle assessment (LCA) of 10 integrated waste management systems (IWMSs) for 3 potential post-event site design scenarios of the London Olympic Park. The aim of the LCA study is to evaluate direct and indirect emissions resulting from various treatment options of municipal solid waste (MSW) annually generated on site together with avoided emissions resulting from energy, materials and nutrients recovery. IWMSs are modelled using GaBi v6.0 Product Sustainability software and results are presented based on the CML (v.Nov-10) characterisation method. The results show that IWMSs with advanced thermal treatment (ATT) and incineration with energy recovery have the lowest Global Warming Potential (GWP) than IWMSs where landfill is the primary waste treatment process. This is due to higher direct emissions and lower avoided emissions from the landfill process compared to the emissions from the thermal treatment processes. LCA results demonstrate that significant environmental savings are achieved through substitution of virgin materials with recycled ones. The results of the sensitivity analysis carried out for IWMS 1 shows that increasing recycling rate by 5%, 10% and 15% compared to the baseline scenario can reduce GWP by 8%, 17% and 25% respectively. Sensitivity analysis also shows how changes in waste composition affect the overall result of the system. The outcomes of such assessments provide decision-makers with fundamental information regarding the environmental impacts of different waste treatment options necessary for

  9. A multi-objective programming model for assessment the GHG emissions in MSW management

    SciTech Connect (OSTI)

    Mavrotas, George; Skoulaxinou, Sotiria; Gakis, Nikos; Katsouros, Vassilis; Georgopoulou, Elena

    2013-09-15

    Highlights: • The multi-objective multi-period optimization model. • The solution approach for the generation of the Pareto front with mathematical programming. • The very detailed description of the model (decision variables, parameters, equations). • The use of IPCC 2006 guidelines for landfill emissions (first order decay model) in the mathematical programming formulation. - Abstract: In this study a multi-objective mathematical programming model is developed for taking into account GHG emissions for Municipal Solid Waste (MSW) management. Mathematical programming models are often used for structure, design and operational optimization of various systems (energy, supply chain, processes, etc.). The last twenty years they are used all the more often in Municipal Solid Waste (MSW) management in order to provide optimal solutions with the cost objective being the usual driver of the optimization. In our work we consider the GHG emissions as an additional criterion, aiming at a multi-objective approach. The Pareto front (Cost vs. GHG emissions) of the system is generated using an appropriate multi-objective method. This information is essential to the decision maker because he can explore the trade-offs in the Pareto curve and select his most preferred among the Pareto optimal solutions. In the present work a detailed multi-objective, multi-period mathematical programming model is developed in order to describe the waste management problem. Apart from the bi-objective approach, the major innovations of the model are (1) the detailed modeling considering 34 materials and 42 technologies, (2) the detailed calculation of the energy content of the various streams based on the detailed material balances, and (3) the incorporation of the IPCC guidelines for the CH{sub 4} generated in the landfills (first order decay model). The equations of the model are described in full detail. Finally, the whole approach is illustrated with a case study referring to the

  10. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.; Pan, V.

    1995-07-03

    This report presents the results from the analysis of the 42st set of environmental quality assessment samples (QAP XLII) that were received on or before June 1, 1995. This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 2 days after the reporting deadline via a modem-telephone connection to the EML computer.

  11. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, P.D.; Minick, S.K.

    1998-07-01

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. This report presents the results from the analysis of the 48th set of environmental quality assessment samples (QAP XLVIII) that were received on or before June 1, 1998.

  12. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, P.D.

    1998-01-01

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 4 days after the reporting deadline via the Internet at www.eml.doe.gov. This report presents the results from the analysis of the 47th set of environmental quality assessment samples (QAP XLVII) that were received on or before December 1, 1997.

  13. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.

    1996-02-01

    This report presents the results from the analysis of the 43rd set of environmental quality assessment samples (QAP XLIII) that were received on or before December 1, 1995. This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 2 days after the reporting deadline via a modem-telephone connection to the EML computer.

  14. Environmental impact assessment of solid waste management in Beijing City, China

    SciTech Connect (OSTI)

    Zhao Yan; Christensen, Thomas H.; Lu Wenjing; Wu Huayong; Wang Hongtao

    2011-04-15

    The environmental impacts of municipal solid waste management in Beijing City were evaluated using a life-cycle-based model, EASEWASTE, to take into account waste generation, collection, transportation, treatment/disposal technologies, and savings obtained by energy and material recovery. The current system, mainly involving the use of landfills, has manifested significant adverse environmental impacts caused by methane emissions from landfills and many other emissions from transfer stations. A short-term future scenario, where some of the landfills (which soon will reach their capacity because of rising amount of waste in Beijing City) are substituted by incinerators with energy recovery, would not result in significant environmental improvement. This is primarily because of the low calorific value of mixed waste, and it is likely that the incinerators would require significant amounts of auxiliary fuels to support combustion of wet waste. As for the long-term future scenario, efficient source separation of food waste could result in significant environmental improvements, primarily because of increase in calorific value of remaining waste incinerated with energy recovery. Sensitivity analysis emphasized the importance of efficient source separation of food waste, as well as the electricity recovery in incinerators, in order to obtain an environmentally friendly waste management system in Beijing City.

  15. Management assessment of tank waste remediation system contractor readiness to proceed with phase 1B privatization

    SciTech Connect (OSTI)

    Certa, P.J.

    1998-01-07

    Readiness to Proceed With Phase 1B Privatization documents the processes used to determine readiness to proceed with tank waste treatment technologies from private industry, now known as TWRS privatization. An overall systems approach was applied to develop action plans to support the retrieval and disposal mission of the TWRS Project. The systems and infrastructure required to support the mission are known. Required systems are either in place or plans have been developed to ensure they exist when needed. Since October 1996 a robust system engineering approach to establishing integrated Technical Baselines, work breakdown structures, tank farms organizational structure and configurations, work scope, and costs has become part of the culture within the TWRS Project. An analysis of the programmatic, management, and technical activities necessary to declare readiness to proceed with execution of the mission demonstrates that the system, personnel, and hardware will be on line and ready to support the private contractors. The systems approach included defining the retrieval and disposal mission requirements and evaluating the readiness of the Project Hanford Management Contract (PHMC) team to support initiation of waste processing by the private contractors in June 2002 and to receive immobilized waste shortly thereafter. The Phase 1 feed delivery requirements from the private contractor Requests for Proposal were reviewed. Transfer piping routes were mapped, existing systems were evaluated, and upgrade requirements were defined.

  16. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  17. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  18. Sandia National Laboratories performance assessment methodology for long-term environmental programs : the history of nuclear waste management.

    SciTech Connect (OSTI)

    Marietta, Melvin Gary; Anderson, D. Richard; Bonano, Evaristo J.; Meacham, Paul Gregory

    2011-11-01

    Sandia National Laboratories (SNL) is the world leader in the development of the detailed science underpinning the application of a probabilistic risk assessment methodology, referred to in this report as performance assessment (PA), for (1) understanding and forecasting the long-term behavior of a radioactive waste disposal system, (2) estimating the ability of the disposal system and its various components to isolate the waste, (3) developing regulations, (4) implementing programs to estimate the safety that the system can afford to individuals and to the environment, and (5) demonstrating compliance with the attendant regulatory requirements. This report documents the evolution of the SNL PA methodology from inception in the mid-1970s, summarizing major SNL PA applications including: the Subseabed Disposal Project PAs for high-level radioactive waste; the Waste Isolation Pilot Plant PAs for disposal of defense transuranic waste; the Yucca Mountain Project total system PAs for deep geologic disposal of spent nuclear fuel and high-level radioactive waste; PAs for the Greater Confinement Borehole Disposal boreholes at the Nevada National Security Site; and PA evaluations for disposal of high-level wastes and Department of Energy spent nuclear fuels stored at Idaho National Laboratory. In addition, the report summarizes smaller PA programs for long-term cover systems implemented for the Monticello, Utah, mill-tailings repository; a PA for the SNL Mixed Waste Landfill in support of environmental restoration; PA support for radioactive waste management efforts in Egypt, Iraq, and Taiwan; and, most recently, PAs for analysis of alternative high-level radioactive waste disposal strategies including repositories deep borehole disposal and geologic repositories in shale and granite. Finally, this report summarizes the extension of the PA methodology for radioactive waste disposal toward development of an enhanced PA system for carbon sequestration and storage systems

  19. Life cycle assessment of four municipal solid waste management scenarios in China

    SciTech Connect (OSTI)

    Hong Jinglan; Li Xiangzhi; Zhaojie Cui

    2010-11-15

    A life cycle assessment was carried out to estimate the environmental impact of municipal solid waste. Four scenarios mostly used in China were compared to assess the influence of various technologies on environment: (1) landfill, (2) incineration, (3) composting plus landfill, and (4) composting plus incineration. In all scenarios, the technologies significantly contribute to global warming and increase the adverse impact of non-carcinogens on the environment. The technologies played only a small role in the impact of carcinogens, respiratory inorganics, terrestrial ecotoxicity, and non-renewable energy. Similarly, the influence of the technologies on the way other elements affect the environment was ignorable. Specifically, the direct emissions from the operation processes involved played an important role in most scenarios except for incineration, while potential impact generated from transport, infrastructure and energy consumption were quite small. In addition, in the global warming category, highest potential impact was observed in landfill because of the direct methane gas emissions. Electricity recovery from methane gas was the key factor for reducing the potential impact of global warming. Therefore, increasing the use of methane gas to recover electricity is highly recommended to reduce the adverse impact of landfills on the environment.

  20. PERFORMANCE ASSESSMENT TO SUPPORT CLOSURE OF SINGLE-SHELL TANK WASTE MANAGEMENT AREA C AT THE HANFORD SITE

    SciTech Connect (OSTI)

    BERGERON MP

    2010-01-14

    Current proposed regulatory agreements (Consent Decree) at the Hanford Site call for closure of the Single-Shell Tank (SST) Waste Management Area (WMA) C in the year 2019. WMA C is part of the SST system in 200 East area ofthe Hanford Site and is one of the first tank farm areas built in mid-1940s. In order to close WMA C, both tank and facility closure activities and corrective actions associated with existing soil and groundwater contamination must be performed. Remedial activities for WMA C and corrective actions for soils and groundwater within that system will be supported by various types of risk assessments and interim performance assessments (PA). The U.S. Department of Energy, Office of River Protection (DOE-ORP) and the State ofWashington Department of Ecology (Ecology) are sponsoring a series of working sessions with regulators and stakeholders to solicit input and to obtain a common understanding concerning the scope, methods, and data to be used in the planned risk assessments and PAs to support closure of WMA C. In addition to DOE-ORP and Ecology staff and contractors, working session members include representatives from the U.S. Enviromnental Protection Agency, the U.S. Nuclear Regulatory Commission (NRC), interested tribal nations, other stakeholders groups, and members of the interested public. NRC staff involvement in the working sessions is as a technical resource to assess whether required waste determinations by DOE for waste incidental to reprocessing are based on sound technical assumptions, analyses, and conclusions relative to applicable incidental waste criteria.

  1. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  2. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player

  3. Risk management of undesirable substances in feed following updated risk assessments

    SciTech Connect (OSTI)

    Verstraete, Frans

    2013-08-01

    Directive 2002/32/EC of 7 May 2002 of the European Parliament and of the Council on undesirable substances in animal feed is the framework for the EU action on undesirable substances in feed. This framework Directive provides: ?that products intended for animal feed may enter for use in the Union from third countries, be put into circulation and/or used in the Union only if they are sound, genuine and of merchantable quality and therefore when correctly used do not represent any danger to human health, animal health or to the environment or could adversely affect livestock production. ?that in order to protect animal and public health and the environment, maximum levels for specific undesirable substances shall be established where necessary. ?for mandatory consultation of a scientific body (EFSA) for all provisions which may have an effect upon public health or animal health or on the environment. ?that products intended for animal feed containing levels of an undesirable substance that exceed the established maximum level may not be mixed for dilution purposes with the same, or other, products intended for animal feed and may not be used for the production of compound feed. Based on the provisions and principles laid down in this framework Directive, maximum levels for a whole range of undesirable substances have been established at EU level. During the discussions in view of the adoption of Directive 2002/32/EC, the European Commission made the commitment to review all existing provisions on undesirable substances on the basis of updated scientific risk assessments. Following requests of the European Commission, the Panel on Contaminants in the Food Chain (CONTAM) from the European Food Safety Authority (EFSA) has completed a series of 30 risk assessments undertaken over the last 5 years on undesirable substances in animal feed reviewing the possible risks for animal and human health due to the presence of these substances in animal feed. EU legislation on

  4. A dynamic model for assessing the effects of management strategies on the reduction of construction and demolition waste

    SciTech Connect (OSTI)

    Yuan Hongping; Chini, Abdol R.; Lu Yujie; Shen Liyin

    2012-03-15

    illustrate the validation and application of the proposed model. Results of the case study not only built confidence in the model so that it can be used for quantitative analysis, but also assessed and compared the effect of three designed policy scenarios on C and D waste reduction. One major contribution of this study is the development of a dynamic model for evaluating C and D waste reduction strategies under various scenarios, so that best management strategies could be identified before being implemented in practice.

  5. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material...

    National Nuclear Security Administration (NNSA)

    GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material May 29, 2014 GTRI's Remove Program works around the world to remove excess nuclear and radiological materials ...

  6. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  7. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  8. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  9. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  10. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  11. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  12. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  13. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  14. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  15. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    on both onsite and offsite tribally owned and non-tribally owned energy infrastructure. ... Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  16. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  17. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This ... States government or any agency thereof. energy.govindianenergy | indianenergy@hq.doe.go...

  18. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  19. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  20. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  1. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  2. V-062: Asterisk Two Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

  3. Improved methodology to assess modification and completion of landfill gas management in the aftercare period

    SciTech Connect (OSTI)

    Morris, Jeremy W.F.; Crest, Marion; Barlaz, Morton A.; Spokas, Kurt A.; Akerman, Anna; Yuan, Lei

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer Performance-based evaluation of landfill gas control system. Black-Right-Pointing-Pointer Analytical framework to evaluate transition from active to passive gas control. Black-Right-Pointing-Pointer Focus on cover oxidation as an alternative means of passive gas control. Black-Right-Pointing-Pointer Integrates research on long-term landfill behavior with practical guidance. - Abstract: Municipal solid waste landfills represent the dominant option for waste disposal in many parts of the world. While some countries have greatly reduced their reliance on landfills, there remain thousands of landfills that require aftercare. The development of cost-effective strategies for landfill aftercare is in society's interest to protect human health and the environment and to prevent the emergence of landfills with exhausted aftercare funding. The Evaluation of Post-Closure Care (EPCC) methodology is a performance-based approach in which landfill performance is assessed in four modules including leachate, gas, groundwater, and final cover. In the methodology, the objective is to evaluate landfill performance to determine when aftercare monitoring and maintenance can be reduced or possibly eliminated. This study presents an improved gas module for the methodology. While the original version of the module focused narrowly on regulatory requirements for control of methane migration, the improved gas module also considers best available control technology for landfill gas in terms of greenhouse gas emissions, air quality, and emissions of odoriferous compounds. The improved module emphasizes the reduction or elimination of fugitive methane by considering the methane oxidation capacity of the cover system. The module also allows for the installation of biologically active covers or other features designed to enhance methane oxidation. A methane emissions model, CALMIM, was used to assist with an assessment of the methane oxidation capacity of

  4. Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Assessment of the Surveillance Program of the High-Level Waste Storage Tanks at Hanford :.~I LALI i~E REJ 163 ROOM 1t 4 F77L.~ ~ -_77 .:earmn OfEeg Asitn Sertr fo niomn 4 z. r _________ rment of the Surveilance Prograrn of the High-Level Storage- Tanks at Hanford P. E WOOD Robert J. Catln, Deputy Directat - Office of Environmental Compliance and Overview Office of Environment MARCH 1980 Report to the U.S. Departrent of Energy Assistant Secretary for Environment Washkngon, DC C March 27, 1980

  5. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R; Lantz, Margaret W; Mili, Ali

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

  6. Assessment, evaluation, and testing of technologies for environmental restoration, decontamination, and decommissioning and high level waste management. Progress report

    SciTech Connect (OSTI)

    Uzochukwu, G.A.

    1997-12-31

    Nuclear and commercial non-nuclear technologies that have the potential of meeting the environmental restoration, decontamination and decommissioning, and high-level waste management objectives are being assessed and evaluated. A detailed comparison of innovative technologies available will be performed to determine the safest and most economical technology for meeting these objectives. Information derived from this effort will be matched with the multi-objectives of the environmental restoration, decontamination and decommissioning, and high-level waste management effort to ensure that the best, most economical, and the safest technologies are used in decision making at USDOE-SRS. Technology-related variables will be developed and the resulting data formatted and computerized for multimedia systems. The multimedia system will be made available to technology developers and evaluators to ensure that the best, most economical, and the safest technologies are used in decision making at USDOE-SRS. Technology-related variables will be developed and the resulting data formatted and computerized for multimedia systems. The multimedia system will be made available to technology developers and evaluators to ensure that the safest and most economical technologies are developed for use at SRS and other DOE sites.

  7. Costs of strikes between vulnerable missile forces

    SciTech Connect (OSTI)

    Canavan, G.H.

    1997-02-01

    This note derives the first and second strike magnitudes and costs for strikes between vulnerable missile forces with multiple warheads. The extension to mixes with invulnerable missiles is performed in a companion note. Stability increases as the number of weapons per missile is reduced. The optimal allocation of weapons between missiles and value is significant in predicting the stability impact of the reduction of the number of weapons per missile at large numbers of missiles, less significant in reducing the number of missiles for fixed weapons per missile. At low numbers of missiles, the stability indices for singlet and triplet configurations are comparable, as are the number of weapons each would deliver on value targets.

  8. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  9. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2010-08-25

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future.

  10. Office of Enterprise Assessments Operational Awareness Record for the Waste Isolation Pilot Plant Limited Review of Engineering Configuration Management - March 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (EA) Operational Awareness Record - Rev. 0 Report Number: EA-WIPP-2014-06-23 Site: Waste Isolation Pilot Plant (WIPP) Subject: Limited Review of Engineering Configuration Management Processes Dates of Activity: June 23-27, 2014 Report Preparer: Charles R. Allen Activity Description/Purpose: Perform a limited-scope review of configuration management processes within the Nuclear Waste Partnership LLC (NWP) engineering organization. Assess the thoroughness and effectiveness of an NWP internal

  11. The financial attractiveness assessment of large waste management projects registered as clean development mechanism

    SciTech Connect (OSTI)

    Bufoni, André Luiz

    2015-09-15

    Highlights: • Projects are not financially attractive without registration as CDMs. • WM benchmarks and indicators are converging and reducing in variance. • A sensitivity analysis reveal that revenue has more of an effect on the financial results. • Results indicate that an extensive database would reduce WM project risk and capital costs. • Disclosure standards would make information more comparable worldwide. - Abstract: This study illustrates the financial analyses for demonstration and assessment of additionality presented in the project design (PDD) and enclosed documents of the 431 large Clean Development Mechanisms (CDM) classified as the ‘waste handling and disposal sector’ (13) over the past ten years (2004–2014). The expected certified emissions reductions (CER) of these projects total 63.54 million metric tons of CO{sub 2}eq, where eight countries account for 311 projects and 43.36 million metric tons. All of the projects declare themselves ‘not financially attractive’ without CER with an estimated sum of negative results of approximately a half billion US$. The results indicate that WM benchmarks and indicators are converging and reducing in variance, and the sensitivity analysis reveals that revenues have a greater effect on the financial results. This work concludes that an extensive financial database with simple standards for disclosure would greatly diminish statement problems and make information more comparable, reducing the risk and capital costs of WM projects.

  12. Quality-of-Life Assessment After Palliative Interventions to Manage Malignant Ureteral Obstruction

    SciTech Connect (OSTI)

    Monsky, Wayne Laurence; Molloy, Chris; Jin, Bedro; Nolan, Timothy; Fernando, Dayantha; Loh, Shaun; Li, Chin-Shang

    2013-10-15

    Purpose: Malignancies may cause urinary tract obstruction, which is often relieved with placement of a percutaneous nephrostomy tube, an internal double J nephro-ureteric stent (double J), or an internal external nephroureteral stent (NUS). We evaluated the affect of these palliative interventions on quality of life (QoL) using previously validated surveys. Methods: Forty-six patients with malignancy related ureteral obstruction received nephrostomy tubes (n = 16), double J stents (n = 15), or NUS (n = 15) as determined by a multidisciplinary team. QoL surveys were administered at 7, 30, and 90 days after the palliative procedure to evaluate symptoms and physical, social, functional, and emotional well-being. Number of related procedures, fluoroscopy time, and complications were documented. Kruskal-Wallis and Friedman's test were used to compare patients at 7, 30, and 90 days. Spearman's rank correlation coefficient was used to assess correlations between clinical outcomes/symptoms and QoL. Results: Responses to QoL surveys were not significantly different for patients receiving nephrostomies, double J stents, or NUS at 7, 30, or 90 days. At 30 and 90 days there were significantly higher reported urinary symptoms and pain in those receiving double J stents compared with nephrostomies (P = 0.0035 and P = 0.0189, respectively). Significantly greater fluoroscopy time was needed for double J stent-related procedures (P = 0.0054). Nephrostomy tubes were associated with more frequent minor complications requiring additional changes. Conclusion: QoL was not significantly different. However, a greater incidence of pain in those receiving double J stents and more frequent tube changes in those with nephrostomy tubes should be considered when choosing palliative approaches.

  13. Results of phase 1 groundwater quality assessment for Single-Shell Tank Waste Management Areas B-BX-BY at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, S.M.

    1998-02-01

    Pacific Northwest National Laboratory conducted a Phase 1 (or first determination) groundwater quality assessment for the US Department of Energy, Richland Operations Office, in accordance with the Federal Facility Compliance Agreement. The purpose of the assessment was to determine if the Single-Shell Tank Waste Management Area (WMA) B-BX-BY has impacted groundwater quality. This report will document the evidence demonstrating that the WMA has impacted groundwater quality.

  14. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  15. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  16. A Decision Analysis Tool for Climate Impacts, Adaptations, and Vulnerabilities

    SciTech Connect (OSTI)

    Omitaomu, Olufemi A; Parish, Esther S; Nugent, Philip J

    2016-01-01

    Climate change related extreme events (such as flooding, storms, and drought) are already impacting millions of people globally at a cost of billions of dollars annually. Hence, there are urgent needs for urban areas to develop adaptation strategies that will alleviate the impacts of these extreme events. However, lack of appropriate decision support tools that match local applications is limiting local planning efforts. In this paper, we present a quantitative analysis and optimization system with customized decision support modules built on geographic information system (GIS) platform to bridge this gap. This platform is called Urban Climate Adaptation Tool (Urban-CAT). For all Urban-CAT models, we divide a city into a grid with tens of thousands of cells; then compute a list of metrics for each cell from the GIS data. These metrics are used as independent variables to predict climate impacts, compute vulnerability score, and evaluate adaptation options. Overall, the Urban-CAT system has three layers: data layer (that contains spatial data, socio-economic and environmental data, and analytic data), middle layer (that handles data processing, model management, and GIS operation), and application layer (that provides climate impacts forecast, adaptation optimization, and site evaluation). The Urban-CAT platform can guide city and county governments in identifying and planning for effective climate change adaptation strategies.

  17. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L.; Sanchez, Brisa N.; Jolliet, Olivier; Zhang, Zhenzhen; Parker, Edith A.; Timothy Dvonch, J.; O'Neill, Marie S.

    2012-01-15

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  18. T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

  19. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  20. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  1. DOE-HDBk-1139/1-2000; Chemical Management Volume 1 of 3

    Broader source: Energy.gov (indexed) [DOE]

    ... National Environmental Training Office NFPA National Fire Protection Association NIOSH ... Despite the 1994 Chemical Vulnerability Study and the management response plan developed ...

  2. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  3. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes

  4. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  5. Taking Risk Assessment and Management to the Next Level: Program-Level Risk Analysis to Enable Solid Decision-Making on Priorities and Funding

    SciTech Connect (OSTI)

    Nelson, J. G.; Morton, R. L.; Castillo, C.; Dyer, G.; Johnson, N.; McSwain, J. T.

    2011-02-01

    A multi-level (facility and programmatic) risk assessment was conducted for the facilities in the Nevada National Security Site (NNSS) Readiness in Technical Base and Facilities (RTBF) Program and results were included in a new Risk Management Plan (RMP), which was incorporated into the fiscal year (FY) 2010 Integrated Plans. Risks, risk events, probability, consequence(s), and mitigation strategies were identified and captured, for most scope areas (i.e., risk categories) during the facilitated risk workshops. Risk mitigations (i.e., efforts in addition to existing controls) were identified during the facilitated risk workshops when the risk event was identified. Risk mitigation strategies fell into two broad categories: threats or opportunities. Improvement projects were identified and linked to specific risks they mitigate, making the connection of risk reduction through investments for the annual Site Execution Plan. Due to the amount of that was collected, analysis to be performed, and reports to be generated, a Risk Assessment/ Management Tool (RAMtool) database was developed to analyze the risks in real-time, at multiple levels, which reinforced the site-level risk management process and procedures. The RAMtool database was developed and designed to assist in the capturing and analysis of the key elements of risk: probability, consequence, and impact. The RAMtool calculates the facility-level and programmatic-level risk factors to enable a side-by-side comparison to see where the facility manager and program manager should focus their risk reduction efforts and funding. This enables them to make solid decisions on priorities and funding to maximize the risk reduction. A more active risk management process was developed where risks and opportunities are actively managed, monitored, and controlled by each facility more aggressively and frequently. risk owners have the responsibility and accountability to manage their assigned risk in real-time, using the

  6. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

  7. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  8. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  9. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  10. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  11. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  12. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  13. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  14. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  15. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  16. Extending the Shared Socioeconomic Pathways for sub-national impacts, adaptation, and vulnerability studies

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Absar, Syeda Mariya; Preston, Benjamin L.

    2015-05-25

    The exploration of alternative socioeconomic futures is an important aspect of understanding the potential consequences of climate change. While socioeconomic scenarios are common and, at times essential, tools for the impact, adaptation and vulnerability and integrated assessment modeling research communities, their approaches to scenario development have historically been quite distinct. However, increasing convergence of impact, adaptation and vulnerability and integrated assessment modeling research in terms of scales of analysis suggests there may be value in the development of a common framework for socioeconomic scenarios. The Shared Socioeconomic Pathways represents an opportunity for the development of such a common framework. However,more » the scales at which these global storylines have been developed are largely incommensurate with the sub-national scales at which impact, adaptation and vulnerability, and increasingly integrated assessment modeling, studies are conducted. Our objective for this study was to develop sub-national and sectoral extensions of the global SSP storylines in order to identify future socioeconomic challenges for adaptation for the U.S. Southeast. A set of nested qualitative socioeconomic storyline elements, integrated storylines, and accompanying quantitative indicators were developed through an application of the Factor-Actor-Sector framework. Finally, in addition to revealing challenges and opportunities associated with the use of the SSPs as a basis for more refined scenario development, this study generated sub-national storyline elements and storylines that can subsequently be used to explore the implications of alternative subnational socioeconomic futures for the assessment of climate change impacts and adaptation.« less

  17. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  18. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  19. Management Control Cover

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OAS-M-06-02 November 2005 REPORT ON MANAGEMENT CONTROLS OVER ASSESSING NATURAL ... and Methodology 5 Prior Audit Reports 6 Management Comments 7 NATURAL RESURCE DAMAGE ...

  20. Independent Oversight Assessment of the Nuclear Safety Culture and Management of Nuclear Safety Concerns at the Hanford Site Waste Treatment and Immobilization Plant, January 2012

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Health, Safety and Security HSS Independent Oversight Assessment of Nuclear Safety Culture and Management of Nuclear Safety Concerns at the Hanford Site Waste Treatment and Immobilization Plant January 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy Enforcement and Oversight Abbreviations Used in this Report i Executive Summary iii Recommendations xi 1.0 Introduction 1 1.1 Background 2 1.2 Scope and Methodology 6 2.0 Current Safety

  1. Enterprise Assessments Targeted Review of the Safety System Management of the Secondary Confinement System and Power Distribution Safety System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility … December 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Targeted Review of the Safety System Management of the Secondary Confinement System and Safety Significant Power Distribution System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility December 2015 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms

  2. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  3. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  4. DOE Project Management Update (Metrics)

    Broader source: Energy.gov [DOE]

    Michael Peek, Deputy Director, Office of Project Management Oversight and Assessments March 22, 2016

  5. CRAD, Self-Assessment Program Assessment Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Self-Assessment Program Assessment Plan CRAD, Self-Assessment Program Assessment Plan Performance Objective: Management should ensure that effective management and independent self-assessments are being conducted periodically by technically qualified personnel. [10 CFR 830.122, subpart A & DOE O 414.1A, Quality Assurance] Criteria: Managers shall assess their management processes and be actively involved in the assessment process to ensure results contribute to improved performance of

  6. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  7. Assessment of contrast enhanced respiration managed cone-beam CT for image guided radiotherapy of intrahepatic tumors

    SciTech Connect (OSTI)

    Jensen, Nikolaj K. G.; Stewart, Errol; Imaging Research Lab, Robarts Research Institute, London, Ontario N6A 5B7; Imaging Program, Lawson Health Research Institute, London, Ontario N6C 2R5 ; Lock, Michael; Fisher, Barbara; Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 ; Kozak, Roman; Chen, Jeff; Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6; Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 ; Lee, Ting-Yim; Imaging Research Lab, Robarts Research Institute, London, Ontario N6A 5B7; Imaging Program, Lawson Health Research Institute, London, Ontario N6C 2R5; Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6; Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 ; Wong, Eugene; Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6; Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1; Department of Physics and Astronomy, University of Western Ontario, London, Ontario N6A 3K7

    2014-05-15

    Purpose: Contrast enhancement and respiration management are widely used during image acquisition for radiotherapy treatment planning of liver tumors along with respiration management at the treatment unit. However, neither respiration management nor intravenous contrast is commonly used during cone-beam CT (CBCT) image acquisition for alignment prior to radiotherapy. In this study, the authors investigate the potential gains of injecting an iodinated contrast agent in combination with respiration management during CBCT acquisition for liver tumor radiotherapy. Methods: Five rabbits with implanted liver tumors were subjected to CBCT with and without motion management and contrast injection. The acquired CBCT images were registered to the planning CT to determine alignment accuracy and dosimetric impact. The authors developed a simulation tool for simulating contrast-enhanced CBCT images from dynamic contrast enhanced CT imaging (DCE-CT) to determine optimal contrast injection protocols. The tool was validated against contrast-enhanced CBCT of the rabbit subjects and was used for five human patients diagnosed with hepatocellular carcinoma. Results: In the rabbit experiment, when neither motion management nor contrast was used, tumor centroid misalignment between planning image and CBCT was 9.2 mm. This was reduced to 2.8?mm when both techniques were employed. Tumors were not visualized in clinical CBCT images of human subjects. Simulated contrast-enhanced CBCT was found to improve tumor contrast in all subjects. Different patients were found to require different contrast injections to maximize tumor contrast. Conclusions: Based on the authors animal study, respiration managed contrast enhanced CBCT improves IGRT significantly. Contrast enhanced CBCT benefits from patient specific tracer kinetics determined from DCE-CT.

  8. Embedding climate change risk assessment within a governance context

    SciTech Connect (OSTI)

    Preston, Benjamin L

    2011-01-01

    Climate change adaptation is increasingly being framed in the context of climate risk management. This has contributed to the proliferation of climate change vulnerability and/or risk assessments as means of supporting institutional decision-making regarding adaptation policies and measures. To date, however, little consideration has been given to how such assessment projects and programs interact with governance systems to facilitate or hinder the implementation of adaptive responses. An examination of recent case studies involving Australian local governments reveals two key linkages between risk assessment and the governance of adaptation. First, governance systems influence how risk assessment processes are conducted, by whom they are conducted, and whom they are meant to inform. Australia s governance system emphasizes evidence-based decision-making that reinforces a knowledge deficit model of decision support. Assessments are often carried out by external experts on behalf of local government, with limited participation by relevant stakeholders and/or civil society. Second, governance systems influence the extent to which the outputs from risk assessment activities are translated into adaptive responses and outcomes. Technical information regarding risk is often stranded by institutional barriers to adaptation including poor uptake of information, competition on the policy agenda, and lack of sufficient entitlements. Yet, risk assessments can assist in bringing such barriers to the surface, where they can be debated and resolved. In fact, well-designed risk assessments can contribute to multi-loop learning by institutions, and that reflexive problem orientation may be one of the more valuable benefits of assessment.

  9. Implementation of the National Incident Management System (NIMS)/Incident Command System (ICS) in the Federal Radiological Monitoring and Assessment Center(FRMAC) - Emergency Phase

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2007-04-01

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, including acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS

  10. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  11. Assessment of Defense-Related Uranium Mines in the United States and Other U.S. Department of Energy Office of Legacy Management (LM) Domestic and International Uranium Initiatives – 15335

    SciTech Connect (OSTI)

    Edge, Russel; Butherus, Michael; Ford, John

    2015-03-01

    Assessment of Defense-Related Uranium Mines in the United States and Other U.S. Department of Energy Office of Legacy Management (LM) Domestic and International Uranium Initiatives – 15335

  12. Hawaii demand-side management resource assessment. Final report, Reference Volume 3 -- Residential and commercial sector DSM analyses: Detailed results from the DBEDT DSM assessment model; Part 1, Technical potential

    SciTech Connect (OSTI)

    1995-04-01

    The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. Numerous tables and figures illustrating the technical potential for demand-side management are included.

  13. Life-cycle assessment of municipal solid waste management alternatives with consideration of uncertainty: SIWMS development and application

    SciTech Connect (OSTI)

    El Hanandeh, Ali; El-Zein, Abbas

    2010-05-15

    This paper describes the development and application of the Stochastic Integrated Waste Management Simulator (SIWMS) model. SIWMS provides a detailed view of the environmental impacts and associated costs of municipal solid waste (MSW) management alternatives under conditions of uncertainty. The model follows a life-cycle inventory approach extended with compensatory systems to provide more equitable bases for comparing different alternatives. Economic performance is measured by the net present value. The model is verified against four publicly available models under deterministic conditions and then used to study the impact of uncertainty on Sydney's MSW management 'best practices'. Uncertainty has a significant effect on all impact categories. The greatest effect is observed in the global warming category where a reversal of impact direction is predicted. The reliability of the system is most sensitive to uncertainties in the waste processing and disposal. The results highlight the importance of incorporating uncertainty at all stages to better understand the behaviour of the MSW system.

  14. Supplemental information related to risk assessment for the off-site transportation of low-level mixed waste for the U.S. Department of Energy waste management programmatic environmental impact statement

    SciTech Connect (OSTI)

    Monette, F.A.; Biwer, B.M.; LePoire, D.J.; Lazaro, M.A.; Antonopoulos, A.A.; Hartmann, H.M.; Policastro, A.J.; Chen, S.Y.

    1996-12-01

    This report provides supplemental information to support the human health risk assessment conducted for the transportation of low-level mixed waste (LLMW) in support of the US Department of Energy Waste Management Programmatic Environmental Impact Statement (WM PEIS). The assessment considers both the radioactive and chemical hazards associated with LLMW transportation. Detailed descriptions of the transportation health risk assessment methods and results of the assessment are presented in Appendix E of the WM PEIS. This report presents additional information that is not included in Appendix E but that was needed to conduct the transportation risk assessment for Waste Management (WM) LLMW. Included are definitions of the LLMW alternatives considered in the WM PEIS; data related to the inventory and to the physical, chemical, and radiological characteristics of WM LLMW; an overview of the risk assessment methods; and detailed results of the assessment for each WM LLMW case considered.

  15. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  16. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect (OSTI)

    Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  17. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System ...

  18. Using performance parameters, metrified performance objectives, and quality management assessments to improve the effectiveness of research organizations

    SciTech Connect (OSTI)

    Bodnarczuk, M

    1995-04-01

    This paper begins by raising the issue of whether the theoretical model of customer-suppliers-products-services usefully describes the activities of laboratory life, using a case study from Fermilab. After describing scientific activities as work, not volunteerism, I present a model that has four performance parameters that can be used to evaluate DOE-funded research laboratories: (1) Do they have a well-defined management system? (2) Are they doing good science? (3) Are they managing their resources effectively? (4) Are they responsive to their customers? From these four parameters I describe how to metrify performance objectives, then use them to evaluate research organizations. I describe these performance objectives within the context of views I have published elsewhere, and according to Stephen R. Covey`s metaphor of production/production capability (P/PC) balance in his book The 7 Habits of Highly Effective People.

  19. Commentary: Risk Management and Reliability Design for Buildings

    SciTech Connect (OSTI)

    Berry, Dennis L.; Cranwell, Robert M.; Hunter, Regina L.

    1999-05-28

    Where there is a significant actuarial basis for decision making (e.g., the occurrence of fires in single-family dwellings), there is little incentive for formal risk management. Formal risk assessments are most useful in those cases where the value of the structure is high, many people may be affected, the societal perception of risk is high, consequences of a mishap would be severe, and the actuarial uncertainty is large. For these cases, there is little opportunity to obtain the necessary experiential data to make informed decisions, and the consequences in terms of money, lives, and societal confidence are severe enough to warrant a formal risk assessment. Other important factors include the symbolic value of the structure and vulnerability to single point failures. It is unlikely that formal risk management and assessment practices will or should replace the proven institutions of building codes and engineering practices. Nevertheless, formal risk assessment can provide valuable insights into the hazards threatening high-value and high-risk (perceived or actual) buildings and structures, which can in turn be translated into improved public health, safety, and security. The key is to choose and apply the right assessment tool to match the structure in question. Design-for-reliability concepts can be applied to buildings, bridges, transportation sys- tems, dams, and other structures. The use of these concepts could have the dual benefits of lowering life-cycle costs by reducing the necessity for maintenance and repair and of enhancing the saiiety and security of the structure's users.

  20. INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER AND WASTEWATER AT THE SEPARATIONS PROCESS RESEARCH UNIT (SPRU) DISPOSITION PROJECT, NEW YORK

    SciTech Connect (OSTI)

    Abitz, R.; Jackson, D.; Eddy-Dilek, C.

    2011-06-27

    The U.S. Department of Energy (DOE) is currently evaluating the water management procedures at the Separations Process Research Unit (SPRU). The facility has three issues related to water management that require technical assistance: (1) due to a excessive rainfall event in October, 2010, contaminated water collected in basements of G2 and H2 buildings. As a result of this event, the contractor has had to collect and dispose of water offsite; (2) The failure of a sump pump at a KAPL outfall resulted in a Notice of Violation issued by the New York State Department of Environment and Conservation (NYSDEC) and subsequent Consent Order. On-site water now requires treatment and off-site disposition; and (3) stormwater infiltration has resulted in Strontium-90 levels discharged to the storm drains that exceed NR standards. The contractor has indicated that water management at SPRU requires major staff resources (at least 50 persons). The purpose of this review is to determine if the contractor's technical approach warrants the large number of staff resources and to ensure that the technical approach is compliant and in accordance with federal, state and NR requirements.

  1. Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the NTS

    SciTech Connect (OSTI)

    Vefa Yucel

    2007-01-03

    U.S. Department of Energy (DOE) Manual M 435.1-1 requires that performance assessments (PAs) and composite analyses (CAs) for low-level waste (LLW) disposal facilities be maintained by the field offices. This plan describes the activities performed to maintain the PA and the CA for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) at the Nevada Test Site (NTS). This plan supersedes the Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (DOE/NV/11718--491-REV 1, dated September 2002). The plan is based on U.S. Department of Energy (DOE) Order 435.1 (DOE, 1999a), DOE Manual M 435.1-1 (DOE, 1999b), the DOE M 435.1-1 Implementation Guide DOE G 435.1-1 (DOE, 1999c), and the Maintenance Guide for PAs and CAs (DOE, 1999d). The plan includes a current update on PA/CA documentation, a revised schedule, and a section on Quality Assurance.

  2. Supplemental information related to risk assessment for the off-site transportation of low-level waste for the U.S. Department of Energy waste management programmatic environmental impact statement

    SciTech Connect (OSTI)

    Monette, F.A.; Biwer, B.M.; LePoire, D.J.; Chen, S.Y. [Argonne National Lab., IL (United States). Environmental Assessment Div.

    1996-12-01

    This report presents supplemental information to support the human health risk assessment conducted for the transportation of low-level waste (LLW) in support of the US Department of Energy Waste Management Programmatic Environmental Impact Statement (WM PEIS). Detailed descriptions of the transportation health risk assessment method and results of the assessment are presented in Appendix E of the WM PEIS and are not repeated in this report. This report presents additional information that is not presented in Appendix E but that was needed to conduct the transportation risk assessment for Waste Management (WM) LLW. Included are definition of the LLW alternatives considered in the WM PEIS, data related to the inventory and to the physical and radiological characteristics of WM LLW, an overview of the risk assessment method, and detailed results of the assessment for each WM LLW alternative considered.

  3. Hawaii demand-side management resource assessment. Final report, Reference Volume 4: The DBEDT DSM assessment model user`s manual

    SciTech Connect (OSTI)

    1995-04-01

    The DBEDT DSM Assessment Model (DSAM) is a spreadsheet model developed in Quattro Pro for Windows that is based on the integration of the DBEDT energy forecasting model, ENERGY 2020, with the output from the building energy use simulation model, DOE-2. DOE-2 provides DSM impact estimates for both energy and peak demand. The ``User`s Guide`` is designed to assist DBEDT staff in the operation of DSAM. Supporting information on model structure and data inputs are provided in Volumes 2 and 3 of the Final Report. DSAM is designed to provide DBEDT estimates of the potential DSM resource for each county in Hawaii by measure, program, sector, year, and levelized cost category. The results are provided for gas and electric and for both energy and peak demand. There are two main portions of DSAM, the residential sector and the commercial sector. The basic underlying logic for both sectors are the same. However, there are some modeling differences between the two sectors. The differences are primarily the result of (1) the more complex nature of the commercial sector, (2) memory limitations within Quattro Pro, and (3) the fact that the commercial sector portion of the model was written four months after the residential sector portion. The structure for both sectors essentially consists of a series of input spreadsheets, the portion of the model where the calculations are performed, and a series of output spreadsheets. The output spreadsheets contain both detailed and summary tables and graphs.

  4. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  5. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  6. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  7. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  8. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Reader/Acrobat Multiple Vulnerabilities U-146: Adobe Reader/Acrobat Multiple Vulnerabilities April 12, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat. PLATFORM: Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive

  9. Semi-annual report of the Department of Energy, Office of Environmental Restoration and Waste Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Klusek, C.S.

    1993-07-01

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 3 days after the reporting deadline via a modem-telephone connection to the EML computer. This report presents the results from the analysis of the 38th set of environmental quality assessment samples (QAP XXXVIII) that were received on or before June 2, 1993.

  10. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  11. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  12. Project Management Information Systems (PMIS) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Assessment & Reporting System (PARS IIe) Office of Project Management Oversight...

  13. IT Project Management Profile | Department of Energy

    Energy Savers [EERE]

    Project Management Profile IT Project Management Profile This is a form that must be completed to initiate the assessment of a Project Manager to determine the level of ...

  14. Vulnerability Analysis of Energy Delivery Control Systems - 2011 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Systems - 2011 Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy delivery systems has emerged as one of the Nation's most serious grid modernization and infrastructure protection issues. Cyber adversaries are becoming increasingly targeted, sophisticated, and better financed. The energy sector must research, develop and deploy new cybersecurity capabilities faster than the adversary can launch new attack tools and techniques. The

  15. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  16. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect (OSTI)

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  17. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  18. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use

  19. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  20. Comparative assessment of municipal sewage sludge incineration, gasification and pyrolysis for a sustainable sludge-to-energy management in Greece

    SciTech Connect (OSTI)

    Samolada, M.C.; Zabaniotou, A.A.

    2014-02-15

    Highlights: • The high output of MSS highlights the need for alternative routes of valorization. • Evaluation of 3 sludge-to-energy valorisation methods through SWOT analysis. • Pyrolysis is an energy and material recovery process resulting to ‘zero waste’. • Identification of challenges and barriers for MSS pyrolysis in Greece was investigated. • Adopters of pyrolysis systems face the challenge of finding new product markets. - Abstract: For a sustainable municipal sewage sludge management, not only the available technology, but also other parameters, such as policy regulations and socio-economic issues should be taken in account. In this study, the current status of both European and Greek Legislation on waste management, with a special insight in municipal sewage sludge, is presented. A SWOT analysis was further developed for comparison of pyrolysis with incineration and gasification and results are presented. Pyrolysis seems to be the optimal thermochemical treatment option compared to incineration and gasification. Sewage sludge pyrolysis is favorable for energy savings, material recovery and high added materials production, providing a ‘zero waste’ solution. Finally, identification of challenges and barriers for sewage sludge pyrolysis deployment in Greece was investigated.

  1. Management and Independent Assessments Guide for Use with 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18

    Management and Independent Assessments Guide for Use with 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A

  2. Notice of Intent to Revise DOE G 414.1-1B, Management and Independent Assessments Guide for Use with 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18

    This memorandum provides justification for revising DOE G 414.1-1B, Management and Independent Assessments Guide for Use With 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A, Implementation of Department of Energy Oversight Policy.

  3. Enterprise Assessments Review of the East Tennessee Technology...

    Broader source: Energy.gov (indexed) [DOE]

    Emergency Management Program July 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S....

  4. Thermal Analysis of the Vulnerability of the Spacesuit Battery Design to Short-Circuit Conditions (Presentation)

    SciTech Connect (OSTI)

    Kim, G. H.; Chaney, L.; Smith, K.; Pesaran, A.; Darcy, E.

    2010-04-22

    NREL researchers created a mathematical model of a full 16p-5s spacesuit battery for NASA that captures electrical/thermal behavior during shorts to assess the vulnerability of the battery to pack-internal (cell-external) shorts. They found that relocating the short from battery pack-external (experimental validation) to pack-internal (modeling study) causes substantial additional heating of cells, which can lead to cell thermal runaway. All three layers of the bank-to-bank separator must fail for the pack-internal short scenario to occur. This finding emphasizes the imperative of battery pack assembly cleanliness. The design is tolerant to pack-internal shorts when stored at 0% state of charge.

  5. Desk study of the proposed Petroleum Resource Management and Assessment project for the Western Siberia Administration, Russia. Volume 1. Export trade information

    SciTech Connect (OSTI)

    Not Available

    1992-05-15

    The United States Trade and Development Program (TDP) is considering the provision of funds to allow a U.S. firm or firms to be hired to conduct a feasibility study on a Petroleum Resource Management and Assessment project in Russia's West Siberian Basin. To evaluate whether or not to fund the study, TDP contracted a Desk Study to evaluate the concept of the project; cost out the scope of work for the feasibility study; estimate the potential exports of U.S. equipment and services during project implementation; and make a recommendation as to whether TDP should fund the study. The goal of the feasibility study would be to stem the rapid decline in oil and gas production which has resulted in a well-publicized hard currency crisis.

  6. State Assistance with Risk-Based Data Management: Inventory and needs assessment of 25 state Class II Underground Injection Control programs. Phase 1

    SciTech Connect (OSTI)

    Not Available

    1992-07-01

    As discussed in Section I of the attached report, state agencies must decide where to direct their limited resources in an effort to make optimum use of their available manpower and address those areas that pose the greatest risk to valuable drinking water sources. The Underground Injection Practices Research Foundation (UIPRF) proposed a risk-based data management system (RBDMS) to provide states with the information they need to effectively utilize staff resources, provide dependable documentation to justify program planning, and enhance environmental protection capabilities. The UIPRF structured its approach regarding environmental risk management to include data and information from production, injection, and inactive wells in its RBDMS project. Data from each of these well types is critical to the complete statistical evaluation of environmental risk and selected automated functions. This comprehensive approach allows state Underground Injection Control (UIC) programs to effectively evaluate the risk of contaminating underground sources of drinking water, while alleviating the additional work and associated problems that often arise when separate data bases are used. CH2M Hill and Digital Design Group, through a DOE grant to the UIPRF, completed an inventory and needs assessment of 25 state Class II UIC programs. The states selected for participation by the UIPRF were generally chosen based on interest and whether an active Class II injection well program was in place. The inventory and needs assessment provided an effective means of collecting and analyzing the interest, commitment, design requirements, utilization, and potential benefits of implementing a in individual state UIC programs. Personal contacts were made with representatives from each state to discuss the applicability of a RBDMS in their respective state.

  7. Applying value engineering and modern assessment tools in managing NEPA: Improving effectiveness of the NEPA scoping and planning process

    SciTech Connect (OSTI)

    ECCLESTON, C.H.

    1998-09-03

    While the National Environmental Policy Act (NEPA) implementing regulations focus on describing ''What'' must be done, they provide surprisingly little direction on ''how'' such requirements are to be implemented. Specific implementation of these requirements has largely been left to the discretion of individual agencies. More than a quarter of a century after NEPA's enactment, few rigorous tools, techniques, or methodologies have been developed or widely adopted for implementing the regulatory requirements. In preparing an Environmental Impact Statement, agencies are required to conduct a public scoping process to determine the range of actions, alternatives, and impacts that will be investigated. Determining the proper scope of analysis is an element essential in the successful planning and implementation of future agency actions. Lack of rigorous tools and methodologies can lead to project delays, cost escalation, and increased risk that the scoping process may not adequately capture the scope of decisions that eventually might need to be considered. Recently, selected Value Engineering (VE) techniques were successfully used in managing a prescoping effort. A new strategy is advanced for conducting a pre-scoping/scoping effort that combines NEPA with VE. Consisting of five distinct phases, this approach has potentially wide-spread implications in the way NEPA, and scoping in particular, is practiced.

  8. State of the Art Assessment of NDE Techniques for Aging Cable Management in Nuclear Power Plants FY2015

    SciTech Connect (OSTI)

    Glass, Samuel W.; Fifield, Leonard S.; Dib, Gerges; Tedeschi, Jonathan R.; Jones, Anthony M.; Hartman, Trenton S.

    2015-09-08

    This milestone report presents an update on the state-of-the-art review and research being conducted to identify key indicators of in-containment cable aging at nuclear power plants (NPPs), and devise in-situ measurement techniques that are sensitive to these key indicators. The motivation for this study stems from the need to address open questions related to nondestructive evaluation (NDE) of aging cables for degradation detection and estimation of condition-based remaining service life. These questions arise within the context of a second round of license extension for NPPs that would extend the operating license to 60 and 80 years. Within the introduction, a review of recently published U.S. and international research and guidance for cable aging management programs including NDE technologies is provided. As with any “state-of-the-art” report, the observations are deemed accurate as of the publication date but cannot anticipate evolution of the technology. Moreover, readers are advised that research and development of cable NDE technology is an ongoing issue of global concern.

  9. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM

  10. Enterprise Assessments Emergency Management Assessment of the...

    Office of Environmental Management (EM)

    ... waste shipments and enter this data into the WIPP ... PAs will be provided in terms of distance; however, for ... to avoid unnecessary search and rescue operations. * ...

  11. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 | Princeton Plasma Physics Lab February 28, 2013, 4:15pm to 5:30pm Colloquia MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 Professor Nicholas K. Coch Queens College CUNY In the last two years. the

  12. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type

  13. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Statistical Outputs of Probabilistic Performance Assessment Robert J. MacKinnon Sandia National Laboratories Used Fuel Disposition Working Group Meeting June 2016 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04- 94AL85000. SAND2016-5123 PE Used Fuel Disposition Performance Assessment

  14. Results of Phase I groundwater quality assessment for single-shell tank waste management Area S-SX at the Hanford Site

    SciTech Connect (OSTI)

    Johnson, V.G.; Chou, C.J.

    1998-01-01

    Pacific Northwest National Laboratory (PNNL) conducted a Phase I, Resource Conservation and Recovery Act of 1976 (RCRA) groundwater quality assessment for the Richland Field Office of the U.S. Department of Energy (DOE-RL), in accordance with the Federal Facility Compliance Agreement. The purpose of the investigation was to determine if the Single-Shell Tank Waste Management Area (WMA) S-SX has impacted groundwater quality. The WMA is located in the southern portion of the 200 West Area of the Hanford Site and consists of the 241-S and 241-SX tank farms and ancillary waste systems. The unit is regulated under RCRA interim-status regulations (40 CFR 265, Subpart F) and was placed in assessment groundwater monitoring (40 CFR 265.93 [d]) in August 1996 because of elevated specific conductance and technetium-99, a non-RCRA co-contaminant, in downgradient monitoring wells. Major findings of the assessment are summarized below: (1) Distribution patterns for radionuclides and RCRA/dangerous waste constituents indicate WMA S-SX has contributed to groundwater contamination observed in downgradient monitoring wells. (2) Drinking water standards for nitrate and technetium-99 are currently exceeded in one RCRA-compliant well (299-W22-46) located at the southeastern comer of the SX tank farm. (3) Technetium-99, nitrate, and chromium concentrations in downgradient well 299-W22-46 (the well with the highest current concentrations) appear to be declining after reaching maximum concentrations in May 1997. (4) Cesium-137 and strontium-90, major constituents of concern in single-shell tank waste, were not detected in any of the RCRA-compliant wells in the WMA network, including the well with the highest current technetium-99 concentrations (299-W22-46). (5) Low but detectable strontium-90 and cesium-137 were found in one old well (2-W23-7), located inside and between the S and SX tank farms.

  15. A total risk assessment methodology for security assessment.

    SciTech Connect (OSTI)

    Aguilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

    2009-06-01

    Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a

  16. Project Management Practices

    Broader source: Energy.gov (indexed) [DOE]

    Version) See Figure 3-3. 19. Administrative Controls 1. Provisions relating to organization and management, procedures, recordkeeping, assessment, and reporting necessary to...

  17. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  18. Seismic assessment of buried pipelines

    SciTech Connect (OSTI)

    Al-Chaar, G.; Brady, P.; Fernandez, G.

    1995-12-31

    A structure and its lifelines are closely linked because the disruption of lifeline systems will obstruct emergency service functions that are vitally needed after an earthquake. As an example of the criticality of these systems, the Association of Bay Area Government (ABAG) recorded thousands of leaks in pipelines that resulted in more than twenty million gallons of hazardous materials being released in several recorded earthquakes. The cost of cleaning the spills from these materials was very high. This information supports the development of seismic protection of lifeline systems. The US Army Corps of Engineers Construction Engineering Research Laboratories (USACERL) has, among its missions, the responsibility to develop seismic vulnerability assessment procedures for military installations. Within this mission, a preliminary research program to assess the seismic vulnerability of buried pipeline systems on military installations was initiated. Phase 1 of this research project resulted in two major studies. In the first, evaluating current procedures to seismically design or evaluate existing lifeline systems, the authors found several significant aspects that deserve special consideration and need to be addressed in future research. The second was focused on identifying parameters related to buried pipeline system vulnerability and developing a generalized analytical method to relate these parameters to the seismic vulnerability assessment of existing pipeline systems.

  19. Environmental Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ASSESSMENT (EA) FOR THE RECONSTRUCTION OF THE SOUTH ACCESS ROAD (CR 802) IN SUPPORT OF THE DEPARTMENT OF ENERGY, WASTE ISOLATION PILOT PLANT (WIPP) IN EDDY COUNTY, NEW MEXICO NEPA #: DOI-BLM-NM-P020-2010-0011-EA PREPARED IN COOPERATION WITH: DEPARTMENT OF ENERGY CARLSBAD FIELD OFFICE P. O. BOX 2078 CARLSBAD, NM 88221-2078 PREPARED BY: OWEN W. LOFTON SUPERVISORY MULTI RESOURCES SPECIALIST BUREAU OF LAND MANAGEMENT CARLSBAD FIELD OFFICE 620 EAST GREENE CARLSBAD, NM 88220 ENVIRONMENTAL ASSESSMENT

  20. Environmental Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    728D Environmental Assessment Integrated Vegetation Management on the Hanford Site, Richland, Washington U.S. Department of Energy Richland Operations Office Richland, Washington 99352 Approved for Public Release; Further Disseminat ion Uillimited June 2011 DOE/EA-1728D June 2011 1 2 3 4 5 6 This page intentionally left blank. 7 8 U.S. Department of Energy DOE/EA-1728D Draft Environmental Assessment iii June 2011 CONTENTS 1 2 1.0 INTRODUCTION

  1. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  2. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    SciTech Connect (OSTI)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-07-09

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a dirty bomb. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  3. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Broader source: Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  4. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system.

  5. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  6. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory

  7. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  8. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  9. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  10. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  11. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  12. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  13. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service)

  14. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  15. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  16. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  17. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  18. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  19. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  20. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 6: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure

  1. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  2. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  3. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  4. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  5. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions...

  6. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  7. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  8. Joint environmental assessment 1997--2001 of the California Department of Food and Agriculture Curly Top Virus Control Program for Bureau of Land Management and Department of Energy

    SciTech Connect (OSTI)

    1997-03-01

    The DOE, Naval Petroleum reserves in California (NPRC), proposes to sign an Amendment to the Cooperative Agreement and Supplement with the California Department of Food and Agriculture (CDFA) to extend the term of the Curly Top Virus Control Program (CTVCP) in California. This program involves Malathion spraying on NPRC lands to control the beet leafhopper, over a five year period from 1997 through 2001. It is expected that approximately 330 acres on Naval Petroleum Reserve Number 1 (NPR-1) and approximately 9,603 acres on Naval Petroleum Reserve Number 2 (NPR-2) will be treated with Malathion annually by CDFA during the course of this program. The actual acreage subject to treatment can vary from year to year. Pursuant to the requirements of the National Environmental Policy Act of 1969 (NEPA), as amended, the potential impacts of the proposed action were analyzed in a Joint Environmental Assessment (DOE/EA-1011) with the US Department of Interior, Bureau of Land Management (BLM) acting as lead agency, in consultation with the CDFA, and the DOE acting as a cooperating agency. Based on the analysis in the EA, DOE has determined that the conduct of the Curly Top Virus Control Program in California is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the NEPA. Therefore, the preparation of an Environmental Impact Statement is not required and DOE is consequently issuing a FONSI.

  9. A review of video security training and assessment-systems and their applications

    SciTech Connect (OSTI)

    Cellucci, J.; Hall, R.J. )

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups.

  10. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  11. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA Security for Managers and Operators (8.15 MB) More Documents & Publications Intermediate SCADA Security Training Course Slides

  12. Study of Risk Assessment Programs at Federal Agencies and Commercial Industry Related to the Conduct or Regulation of High Hazard Operations

    SciTech Connect (OSTI)

    Bari, R.; Rosenbloom, S.; O'Brien, J.

    2011-03-13

    In the Department of Energy (DOE) Implementation Plan (IP) for Defense Nuclear Facilities Safety Board's Recommendation 2009-1, the DOE committed to studying the use of quantitative risk assessment methodologies at government agencies and industry. This study consisted of document reviews and interviews of senior management and risk assessment staff at six organizations. Data were collected and analyzed on risk assessment applications, risk assessment tools, and controls and infrastructure supporting the correct usage of risk assessment and risk management tools. The study found that the agencies were in different degrees of maturity in the use of risk assessment to support the analysis of high hazard operations and to support decisions related to these operations. Agencies did not share a simple, 'one size fits all' approach to tools, controls, and infrastructure needs. The agencies recognized that flexibility was warranted to allow use of risk assessment tools in a manner that is commensurate with the complexity of the application. The study also found that, even with the lack of some data, agencies application of the risk analysis structured approach could provide useful insights such as potential system vulnerabilities. This study, in combination with a companion study of risk assessment programs in the DOE Offices involved in high hazard operations, is being used to determine the nature and type of controls and infrastructure needed to support risk assessments at the DOE.

  13. Enterprise Assessments Operational Awareness Record of the Follow-up Review of Engineeing Configuration Management Processes at the Waste Isolation Pilot Plant- June 2015

    Broader source: Energy.gov [DOE]

    Operational Awareness Record of the Follow-up Review of Engineering Configuration Management Processes at the Waste Isolation Pilot Plant

  14. Enterprise Assessments Lessons Learned from Targeted Reviews of the Management of Safety Systems at U.S. Department of Energy Nuclear Facilities – April 2016

    Broader source: Energy.gov [DOE]

    Lessons Learned from Targeted Reviews of the Management of Safety Systems at U.S. Department of Energy Nuclear Facilities

  15. High-level waste inventory, characteristics, generation, and facility assessment for treatment, storage, and disposal alternatives considered in the US Department of Energy eenvironmental management programmatic environmental impact statement

    SciTech Connect (OSTI)

    Folga, S.M.; Conzelmann, G.; Gillette, J.L.; Kier, P.H.; Poch, L.A.

    1996-12-01

    This report provides data and information needed to support the risk and impact assessments of high-level waste (HLW) management alternatives in the U.S. Department of Energy Waste Management (WM) Programmatic Environmental Impact Statement (PEIS). Available data on the physical form, chemical and isotopic composition, storage locations, and other waste characteristics of interest are presented. High-level waste management follows six implementation phases: current storage, retrieval, pretreatment, treatment, interim canister storage, and geologic repository disposal; pretreatment, treatment, and repository disposal are outside the scope of the WM PEIS. Brief descriptions of current and planned HLW management facilities are provided, including information on the type of waste managed in the facility, costs, product form, resource requirements, emissions, and current and future status. Data sources and technical and regulatory assumptions are identified. The range of HLW management alternatives (including decentralized, regionalized, and centralized approaches) is described. The required waste management facilities include expanded interim storage facilities under the various alternatives. Resource requirements for construction (e.g., land and materials) and operation (e.g., energy and process chemicals), work force, costs, effluents, design capacities, and emissions are presented for each alternative.

  16. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  17. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  18. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  19. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  20. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  1. Vulnerabilities and Opportunities at the Nexus of Electricity, Water and Climate

    SciTech Connect (OSTI)

    Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

    2015-08-01

    The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warming that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.

  2. Vulnerabilities and opportunities at the nexus of electricity, water and climate

    SciTech Connect (OSTI)

    Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

    2015-08-04

    The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warming that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.

  3. Vulnerabilities and opportunities at the nexus of electricity, water and climate

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

    2015-08-04

    The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warmingmore » that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.« less

  4. Seismic Vulnerability Assessment Waste Characterization Reduction and Repackaging Building, TA-50-69

    SciTech Connect (OSTI)

    M.W.Sullivan; J.Ruminer; I.Cuesta

    2003-02-02

    This report presents the results of the seismic structural analyses completed on the Waste Characterization Reduction and Repackaging (WCRR) Building in support of ongoing safety analyses. WCRR is designated as TA-50-69 at Los Alamos National Laboratory, Los Alamos, New Mexico. The facility has been evaluated against Department of Energy (DOE) seismic criteria for Natural Phenomena Hazards (NPH) Performance Category II (PC 2). The seismic capacities of two subsystems within the WCRR building, the material handling glove box and the lift rack immediately adjacent to the Glove Box are also documented, and the results are presented.

  5. Northeast Climate Science Center: Transposing Extreme Rainfall to Assess Climate Vulnerability

    Broader source: Energy.gov [DOE]

    Climate models predict significant increases in the magnitude and frequency of extreme rainfalls.  However, climate model projections of precipitation vary greatly across models.  For communities...

  6. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disposal: Preliminary Performance Assessment Emily Stein, Geoff Freeze, Kris Kuhlman, Glenn Hammond, Jenn Frederick Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Deep Borehole Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract

  7. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Building the Crystalline Reference Case Performance Assessment Emily Stein, Jenn Frederick, Glenn Hammond, Paul Mariner, Dave Sevougian Sandia National Laboratories 2016 UFDC Annual Working Group Meeting GDSA Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under

  8. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Integrating Discrete Fracture Networks with Performance Assessment Emily Stein, Kris Kuhlman Sandia National Laboratories Nataliia Makedonska, Satish Karra, Jeffrey Hyman Los Alamos National Laboratory 2016 UFDC Annual Working Group Meeting GDSA Integration Session, June 8, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's

  9. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    D-Repo Performance Assessment: Crystalline Reference Case Emily Stein, Dave Sevougian, Glenn Hammond, Jenn Frederick, Paul Mariner Sandia National Laboratories 2016 UFDC Annual Working Group Meeting Defense Repository Session, June 9, 2016 Las Vegas, NV Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration

  10. Locating Climate Insecurity: Where Are the Most Vulnerable Places...

    Open Energy Info (EERE)

    in Africa? AgencyCompany Organization: The Robert Strauss Center Topics: Co-benefits assessment, Background analysis Resource Type: Publications Website: ccaps.strausscenter.o...

  11. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect (OSTI)

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  12. Geologic mapping for groundwater resource protection and assessment

    SciTech Connect (OSTI)

    Shafer, J.M. . Earth Sciences and Resources Inst.); Berg, R.C. )

    1993-03-01

    Groundwater is a vital natural resource in the US and around the world. In order to manage and protect this often threatened resource one must better understand its occurrence, extent, and susceptibility to contamination. Geologic mapping is a fundamental approach to developing more detailed and accurate assessments of groundwater resources. The stratigraphy and lithology of earth materials provide the framework for groundwater systems, whether they are deep confined aquifers or shallow, water table environments. These same earth materials control, in large part, the rates of migration of water and contaminants into and through groundwater systems thus establishing the potential yields of the systems and their vulnerability to contamination. Geologic mapping is used to delineate and display the vertical sequencing of earth materials either in cross-section or over lateral areas as in the stack-unit geologic map. These geologic maps, along with supportive hydrogeologic information, are used to identify the three-dimensional positioning and continuity of aquifer and non-aquifer earth materials. For example, detailed stack-unit mapping to a depth of 30 meters has been completed for a portion of a northern Illinois county. Groundwater contamination potentials were assigned to various vertical sequences of materials. Where aquifers are unconfined, groundwater contamination potentials are greatest. Conversely, other considerations being equal, the thicker the confining unit, the lower the contamination potential. This information is invaluable for land use decision-making; water supply assessment, development, and management; and environmental protection planning.

  13. Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments Assessments The Department of Energy's (DOE) Enterprise Assessments programs provide DOE line management, Congress, and other stakeholders with an independent evaluation of the effectiveness of DOE policy and line management performance in safety and security, and other critical areas as directed by the Secretary of Energy. This information provides assurance to our stakeholders and identifies areas for improvement to our leadership to support the safe performance of the Department's

  14. Supplemnental Volume - Independent Oversight Assessment of the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Health, Safety and Security HSS i Independent Oversight Assessment of Safety Culture and Management of Nuclear ... Program EM Office of Environmental Management EM-1 ...

  15. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 86: IBM WebSphere Sensor Events Multiple Vulnerabilities U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities June 8, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM WebSphere Sensor Events PLATFORM: IBM WebSphere Sensor Events 7.x ABSTRACT: Some vulnerabilites have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. Reference Links: Secunia ID 49413 No CVE references. Vendor URL IMPACT

  16. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am Addthis PROBLEM: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities. PLATFORM: Cisco WebEx recording players. Microsoft Windows, Apple Mac OS X, and Linux versions of the player are all affected. Affected versions of the players are those prior to client builds T27LC SP22 and

  17. Fermilab | Directorate | Office of Project Management Oversight...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE links DOE Office of Project Assessment (SC-28) DOE Office of Project Assessment Project Management Processes and Procedures DOE Directives Home Page DOE Policies, Orders and ...

  18. Project Management Career Development Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Project Management Career Development Program (PMCDP) in Office of Project Management Oversight and Assessments was established in 2001 by a Congressional mandate to ensure the Department of...

  19. Technology Readiness Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Waste Management Tank Waste and Waste Processing Technology Readiness Assessments Technology Readiness Assessments Documents Available for Download August 1, 2013 Technology ...

  20. Enterprise Assessments Lessons Learned from Targeted Reviews...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    organizational learning. Enterprise Assessments Lessons Learned from Targeted Reviews of the Management of Safety ... Office - March 2012 Safety System Oversight Assessment, Los ...