Sample records for management vulnerability assessment

  1. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S. [Carnegie Mellon University, Pittsburgh, PA (United States). Dept. of Civil & Environmental Engineering

    2009-09-15T23:59:59.000Z

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  2. Ecosystem Vulnerability Assessment - Patterns of Climate Change...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

  3. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    NONE

    1995-03-01T23:59:59.000Z

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  4. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  5. Assessment of Chemical and Radiological Vulnerabilities

    SciTech Connect (OSTI)

    SETH, S.S.

    2000-05-17T23:59:59.000Z

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities.

  6. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  7. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27T23:59:59.000Z

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  8. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

  9. SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

  10. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier, E-mail: jjtoroca@unal.edu.co [Institute of Environmental Studies, National University of Colombia, Bogota (Colombia); Duarte, Oscar, E-mail: ogduartev@unal.edu.co [Department of Electrical and Electronics Engineering, National University of Colombia, Bogota (Colombia); Requena, Ignacio, E-mail: requena@decsai.ugr.es [Department of Computer Science and Artificial Intelligence, University of Granada (Spain); Zamorano, Montserrat, E-mail: zamorano@ugr.es [Department of Civil Engineering, University of Granada (Spain)

    2012-01-15T23:59:59.000Z

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  11. Structural Vulnerability Assessment of Electric Power Grids

    E-Print Network [OSTI]

    Koç, Yakup; Kooij, Robert E; Brazier, Frances M T

    2013-01-01T23:59:59.000Z

    Cascading failures are the typical reasons of black- outs in power grids. The grid topology plays an important role in determining the dynamics of cascading failures in power grids. Measures for vulnerability analysis are crucial to assure a higher level of robustness of power grids. Metrics from Complex Networks are widely used to investigate the grid vulnerability. Yet, these purely topological metrics fail to capture the real behaviour of power grids. This paper proposes a metric, the effective graph resistance, as a vulnerability measure to de- termine the critical components in a power grid. Differently than the existing purely topological measures, the effective graph resistance accounts for the electrical properties of power grids such as power flow allocation according to Kirchoff laws. To demonstrate the applicability of the effective graph resistance, a quantitative vulnerability assessment of the IEEE 118 buses power system is performed. The simulation results verify the effectiveness of the effect...

  12. Antioch University and EPA Webinar: Assessing Vulnerability of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Webinar: Assessing Vulnerability of Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing...

  13. assessing infrastructure vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

  14. Defense of Trust Management Vulnerabilities in Distributed Networks

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun , Zhu Han into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five networks inherently rely on cooper- ation among distributed entities. However, coopera- tion is fragile

  15. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10T23:59:59.000Z

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  16. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01T23:59:59.000Z

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  17. Researchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability

    E-Print Network [OSTI]

    Nagurney, Anna

    , electrical power supply chains and telecommunications networks. University of Massachusetts Amherst components like roads, electrical power stations or transmission lines are destroyed and captures how usersResearchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability Natural disasters

  18. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04T23:59:59.000Z

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  19. An assessment of fire vulnerability for aged electrical relays

    SciTech Connect (OSTI)

    Vigil, R.A. [Sandia National Labs., Albuquerque, NM (United States)]|[Science and Engineering Associates, Inc., Albuquerque, NM (United States); Nowlen, S.P. [Sandia National Labs., Albuquerque, NM (United States)

    1995-03-01T23:59:59.000Z

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized.

  20. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01T23:59:59.000Z

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  1. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30T23:59:59.000Z

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  2. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/survivability. Our discussion employs the power transmission grid. 1 Introduction

  3. Vulnerability assessment of water supply systems for insufficient fire flows

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15T23:59:59.000Z

    supply systems are vulnerable to many forms of terrorist acts, most of the vulnerability analysis studies on these systems have been for chemical and biological threats. Because of the interdependency of water supply infrastructure and emergency fire...

  4. VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN

    E-Print Network [OSTI]

    Richner, Heinz

    VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

  5. Assessing the vulnerability of the fiber infrastructure to disasters

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

  6. Assessing node risk and vulnerability in epidemics on networks

    E-Print Network [OSTI]

    Rogers, Tim

    2015-01-01T23:59:59.000Z

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  7. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01T23:59:59.000Z

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  8. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  9. LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis

    SciTech Connect (OSTI)

    Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

    1986-01-01T23:59:59.000Z

    At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

  10. T-731:Symantec IM Manager Code Injection Vulnerability | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability

  11. Department of Energy Plutonium ES&H Vulnerability Assessment Savannah River Site interim compensatory measures

    SciTech Connect (OSTI)

    Bickford, W.E.

    1994-09-15T23:59:59.000Z

    The Savannah River Site (SRS) has recently completed a self-assessment of potential vulnerabilities associated with plutonium and other transuranic materials stored at the site. An independent Working Group Assessment Team (WGAT) appointed by DOE/ES&H also performed an independent assessment, and reviewed and validated the site self-assessment. The purpose of this report is to provide a status of interim compensatory measures at SRS to address hazards in advance of any corrective actions. ES&H has requested this status for all vulnerabilities ranked medium or higher with respect to potential consequences to workers, environment, and the public.

  12. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  13. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment| Department

  14. Using vulnerability assessments to design facility safeguards and security systems

    SciTech Connect (OSTI)

    Snell, M.; Jaeger, C.

    1994-08-01T23:59:59.000Z

    The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

  15. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    and Cooperation Sector Energy, Land, Water Focus Area Agriculture Topics Co-benefits assessment, Background analysis Resource Type Lessons learnedbest practices Website...

  16. Sandia National Laboratories: Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Assessments Digital Instrument and Control (I&C) is an integral part of the nuclear power industry in the United States. I&C systems monitor the safe, reliable and secure...

  17. VULNERABILITY ASSESSMENT FOR MINING SUBSIDENCE HAZARD DECK Olivier1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , roads, public facilities and public functions) as well as they deal with method of assessment is of a highly accidental nature when it takes place over mines that use abandoned rooms and pillars method even

  18. TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack on supervisory was supported by Electric Power Research Center (EPRC) at Iowa State University. C.-W. Ten, C.-C. Liu, and M

  19. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack was supported by the Electric Power Research Center (EPRC) at Iowa State University. Paper no. TPWRS-00963- 2007

  20. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08T23:59:59.000Z

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  1. Seismic vulnerability assessment to slight dam-age based on experimental modal parameters

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

  2. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

  3. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01T23:59:59.000Z

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  4. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  5. A watershed-based method for environmental vulnerability assessment with a case study of the Mid-Atlantic region

    SciTech Connect (OSTI)

    Tran, Liem T., E-mail: ltran1@utk.edu [Department of Geography, University of Tennessee, Knoxville, TN (United States); O& #x27; Neill, Robert V. [OTIE and Associates, Oak Ridge, TN (United States); Smith, Elizabeth R. [U.S. Environmental Protection Agency, Office of Research and Development, National Exposure Research Laboratory, Research Triangle Park, NC (United States)

    2012-04-15T23:59:59.000Z

    The paper presents a method for environmental vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of 'self-/peer-appraisal' of a watershed in term of vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative vulnerability pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning. - Highlights: Black-Right-Pointing-Pointer We present a method for regional environmental vulnerability assessment. Black-Right-Pointing-Pointer It is based on the self-/peer-appraisal concept in term of vulnerability. Black-Right-Pointing-Pointer The analysis is facilitated by two separate linear optimization programs. Black-Right-Pointing-Pointer The method provides insights on the regional relative vulnerability pattern.

  6. California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area

    SciTech Connect (OSTI)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-11-01T23:59:59.000Z

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

  7. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01T23:59:59.000Z

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  8. CRAD, Configuration Management Assessment Plan

    Broader source: Energy.gov [DOE]

    The objective of this assessment is to determine whether a Configuration Management Program (CM) is in place which allows for the availability and retrievability of accurate information, improves response to design and operational decisions, enhances worker safety, increases facility safety and reliability, increases efficiency of work efforts, and helps maintain integrity of interfacing orders.

  9. System vulnerability as a concept to assess power system dynamic security

    SciTech Connect (OSTI)

    Fouad, A.A.; Qin Zhou; Vittal, V. (Iowa State Univ., Ames, IA (United States))

    1994-05-01T23:59:59.000Z

    The concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. This new concept combines information on the level of security and its trend with changing system condition. In this paper the transient energy function (TEF) method is used as a tool of analysis. The energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity ([partial derivative][Delta]V/[partial derivative]p) to a changing system parameter p as an indicator of its trend. The thresholds for acceptable levels of the security indicator ([Delta]V) and its trend ([partial derivative][Delta]V/[partial derivative]p) are related to the stability limits of a critical system parameter. A method is proposed to determine these thresholds using heuristic techniques derived from operating practices and policies for a change in plant generation. Results from the IEEE 50 generator test system are presented to illustrate the procedure.

  10. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  11. Risk assessment in environmental management

    SciTech Connect (OSTI)

    Asante-Duah, D.K.

    1998-07-01T23:59:59.000Z

    This book is a straightforward exposition of US EPA-based procedures for the risk assessment and risk management of contaminated land, interwoven with discussions on some of the key fundamentals on the fate and transport of chemicals in the environment and the toxic action of environmental chemicals. The book is logically structured, commencing with a general overview of the principles of risk assessment and the interface with environmental legislation. There follows an introduction to environmental fate and transport, modeling, toxicology and uncertainty analysis, and a discussion of the elements of a risk assessment (site characterization, exposure analysis, toxic action and risk characterization), intake of a chemical with its environmental concentration and activity-related parameters such as inhalation rate and exposure time. The book concludes with a discussion on the derivation of risk-based action levels and remediation goals.

  12. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities

    SciTech Connect (OSTI)

    Wilkey, D.D.

    1995-09-01T23:59:59.000Z

    This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

  13. Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant

    SciTech Connect (OSTI)

    HERZOG, K.R.

    1999-09-01T23:59:59.000Z

    A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

  14. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    SciTech Connect (OSTI)

    Kvaerner, Jens [Bioforsk-Norwegian Institute for Agricultural and Environmental Research, Soil and Environmental Division, Frederik A. Dahls vei 20, N-1432 As (Norway)]. E-mail: jens.kvarner@bioforsk.no; Swensen, Grete [NIKU, Norwegian Institute for Cultural Heritage Research, Storgata 2, P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: grete.swensen@niku.no; Erikstad, Lars [NINA, Norwegian Institute for Nature Research, Dronningens gt. 13., P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: lars.erikstad@nina.no

    2006-07-15T23:59:59.000Z

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended.

  15. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01T23:59:59.000Z

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  16. BSBA IN MANAGEMENT -HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN

    E-Print Network [OSTI]

    Gallo, Linda C.

    BSBA IN MANAGEMENT - HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN (REV. 7 in Human Resource Management (HRM), the goal is to provide a foundation of all areas of human resources countries. · Content Delivered in: MGT 350, MGT 405, & MGT 357. · Assessment Method: Culminating exam

  17. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01T23:59:59.000Z

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  18. Lessons Learned from Cyber Security Assessments of SCADA and...

    Energy Savers [EERE]

    Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

  19. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E. [and others

    1996-02-15T23:59:59.000Z

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  20. Management Assessment and Independent Assessment Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-31T23:59:59.000Z

    The revision to this Guide reflects current assessment practices, international standards, and changes in the Department of Energy expectations. Cancels DOE G 414.1-1. Canceled by DOE G 414.1-1B.

  1. Open Source Course Management and Assessment System

    E-Print Network [OSTI]

    LON-CAPA: Open Source Course Management and Assessment System Gerd Kortemeyer Michigan State, homework problems) is a lot of work · Doing so for use in just one course is a waste of time and effort Assembly Course Management Resource Assembly Course Management #12;Campus A Campus B Resource Assembly

  2. Environmental Management Assessment of the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Not Available

    1993-04-01T23:59:59.000Z

    This report documents the results of the Environmental Management Assessment performed at the Fernald Environmental Management Project (FEMP) in Fernald, Ohio. During this assessment, the activities conducted by the assessment team included review of internal documents and reports from previous audits and assessments; interviews with US Department of Energy (DOE) and FEMP contractor personnel; and inspection and observation of selected facilities and operations. The onsite portion of the assessment was conducted from March 15 through April 1, 1993, by DOE`s Office of Environmental Audit (EH-24) located within the Office of the Assistant Secretary for Environment, Safety, and Health (EH-1). EH-24 carries out independent assessments of DOE facilities and activities as part of the EH-1 Environment, Safety, and Health (ES&H) Oversight Audit Program. The EH-24 program is designed to evaluate the status of DOE facilities and activities with respect to compliance with Federal, state, and local environmental laws and regulations; compliance with DOE Orders, Guidance and Directives; conformance with accepted industry practices and standards of performance; and the status and adequacy of management systems developed to address environmental requirements. The Environmental Management Assessment of FEMP focused on the adequacy of environmental management systems. Further, in response to requests by the Office of Environmental Restoration and Waste Management (EM) and Fernald Field Office (FN), Quality Assurance and Environmental Radiation activities at FEMP were evaluated from a programmatic standpoint. The results of the evaluation of these areas are contained in the Environmental Protection Programs section in this report.

  3. Office of Emergency Management Assessments | Department of Energy

    Office of Environmental Management (EM)

    Office of Emergency Management Assessments conducts assessments to provide critical feedback and objective information on emergency management programs and performance. This...

  4. Supplier Management Self-Assessment Tool

    E-Print Network [OSTI]

    Lean Advancement Initiative

    This tool represents a framework that companies can utilize to conduct a self-assessment of how much progress they have made in developing lean supply chain management capabilities. In addition, it can be used to establish ...

  5. Management and Independent Assessments Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-03-27T23:59:59.000Z

    The Guide reflects updated standards for assessment practices, international standards, and changes in DOE expectations related to quality assurance (QA). Cancels DOE G 414.1-1B.

  6. Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL; Sheldon, Federick T. [University of Memphis; Schlicher, Bob G [ORNL

    2015-01-01T23:59:59.000Z

    There are many influencing economic factors to weigh from the defender-practitioner stakeholder point-of-view that involve cost combined with development/deployment models. Some examples include the cost of countermeasures themselves, the cost of training and the cost of maintenance. Meanwhile, we must better anticipate the total cost from a compromise. The return on investment in countermeasures is essentially impact costs (i.e., the costs from violating availability, integrity and confidentiality / privacy requirements). The natural question arises about choosing the main risks that must be mitigated/controlled and monitored in deciding where to focus security investments. To answer this question, we have investigated the cost/benefits to the attacker/defender to better estimate risk exposure. In doing so, it s important to develop a sound basis for estimating the factors that derive risk exposure, such as likelihood that a threat will emerge and whether it will be thwarted. This impact assessment framework can provide key information for ranking cybersecurity threats and managing risk.

  7. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  8. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01T23:59:59.000Z

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  9. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26T23:59:59.000Z

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  10. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Office of Environmental Management (EM)

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  11. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

    2012-07-01T23:59:59.000Z

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  12. NDE to Manage Atmospheric SCC in Canisters for Dry Storage of Spent Fuel: An Assessment

    SciTech Connect (OSTI)

    Meyer, Ryan M.; Pardini, Allan F.; Cuta, Judith M.; Adkins, Harold E.; Casella, Andrew M.; Qiao, Hong (Amy); Larche, Michael R.; Diaz, Aaron A.; Doctor, Steven R.

    2013-09-01T23:59:59.000Z

    This report documents efforts to assess representative horizontal (Transuclear NUHOMS®) and vertical (Holtec HI-STORM) storage systems for the implementation of non-destructive examination (NDE) methods or techniques to manage atmospheric stress corrosion cracking (SCC) in canisters for dry storage of used nuclear fuel. The assessment is conducted by assessing accessibility and deployment, environmental compatibility, and applicability of NDE methods. A recommendation of this assessment is to focus on bulk ultrasonic and eddy current techniques for direct canister monitoring of atmospheric SCC. This assessment also highlights canister regions that may be most vulnerable to atmospheric SCC to guide the use of bulk ultrasonic and eddy current examinations. An assessment of accessibility also identifies canister regions that are easiest and more difficult to access through the ventilation paths of the concrete shielding modules. A conceivable sampling strategy for canister inspections is to sample only the easiest to access portions of vulnerable regions. There are aspects to performing an NDE inspection of dry canister storage system (DCSS) canisters for atmospheric SCC that have not been addressed in previous performance studies. These aspects provide the basis for recommendations of future efforts to determine the capability and performance of eddy current and bulk ultrasonic examinations for atmospheric SCC in DCSS canisters. Finally, other important areas of investigation are identified including the development of instrumented surveillance specimens to identify when conditions are conducive for atmospheric SCC, characterization of atmospheric SCC morphology, and an assessment of air flow patterns over canister surfaces and their influence on chloride deposition.

  13. Shift manager workload assessment - A case study

    SciTech Connect (OSTI)

    Berntson, K.; Kozak, A. [Bruce Power, P O Box 1540 B10, Tiverton, Ont. N0G 2T0 (Canada); Malcolm, J. S. [Atomic Energy of Canada Ltd., 2251 Speakman Drive, Mississauga, Ont. L5K 1B2 (Canada)

    2006-07-01T23:59:59.000Z

    In early 2003, Bruce Power restarted two of its previously laid up units in the Bruce A generating station, Units 3 and 4. However, due to challenges relating to the availability of personnel with active Shift Manager licenses, an alternate shift structure was proposed to ensure the safe operation of the station. This alternate structure resulted in a redistribution of responsibility, and a need to assess the resulting changes in workload. Atomic Energy of Canada Limited was contracted to perform a workload assessment based on the new shift structure, and to provide recommendations, if necessary, to ensure Shift Managers had sufficient resources available to perform their required duties. This paper discusses the performance of that assessment, and lessons learned as a result of the work performed during the Restart project. (authors)

  14. Empirical Estimates of 0Day Vulnerabilities in Control Systems

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Sean M. McBride; Trevor A. McQueen

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, which has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to well managed control systems which have already effectively mitigated the publicly known vulnerabilities. In these well managed systems the risk contribution from 0Days will have proportionally increased. To aid understanding of how great a risk 0Days may pose to control systems, an estimate of how many are in existence is needed. Consequently, using the 0Day definition given above, we developed and applied a method for estimating how many 0Day vulnerabilities are in existence on any given day. The estimate is made by: empirically characterizing the distribution of the lifespans, measured in days, of 0Day vulnerabilities; determining the number of vulnerabilities publicly announced each day; and applying a novel method for estimating the number of 0Day vulnerabilities in existence on any given day using the number of vulnerabilities publicly announced each day and the previously derived distribution of 0Day lifespans. The method was first applied to a general set of software applications by analyzing the 0Day lifespans of 491 software vulnerabilities and using the daily rate of vulnerability announcements in the National Vulnerability Database. This led to a conservative estimate that in the worst year there were, on average, 2500 0Day software related vulnerabilities in existence on any given day. Using a smaller but intriguing set of 15 0Day software vulnerability lifespans representing the actual time from discovery to public disclosure, we then made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day software vulnerabilities in existence on any given day. We then proceeded to identify the subset of software applications likely to be used in some control systems, analyzed the associated subset of vulnerabilities, and characterized their lifespans. Using the previously developed method of analysis, we very conservatively estimated 250 control system related 0Day vulnerabilities in existence on any given day. While reasonable, this first order estimate for control systems is probably far more conservative than those made for general software systems since the estimate did not include vulnerabilities unique to control system specific components. These control system specific vulnerabilities were unable to be included in the estimate for a variety of reasons with the most problematic being that the public announcement of unique control system vulnerabilities is very sparse. Consequently, with the intent to improve the above 0Day estimate for control systems, we first identified the additional, unique to control systems, vulnerability estimation constraints and then investigated new mechanisms which may be useful for estimating the number of unique 0Day software vulnerabilities found in control system components. We proceeded to identify a number of new mechanisms and approaches for estimating and incorporating control system specific vulnerabilities into an improved 0Day estimation method. These new mechanisms and approaches appear promising and will be more rigorously evaluated during the course of the next year.

  15. attitudes perceived vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Summary: BIODIVERSITY RESEARCH Assessing species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner-...

  16. Seamless Energy Management Systems Part I: Assessment of Energy

    E-Print Network [OSTI]

    Seamless Energy Management Systems Part I: Assessment of Energy Management Systems and Key to Engineer the Future Electric Energy System #12;#12;Seamless Energy Management Systems Part I: Assessment of Energy Management Systems and Key Technological Requirements Final Project Report Project Faculty Team

  17. T-581: Novell Access Manager Java Double Literal Denial of Service...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability Report: Novell Access Manager 3.x Oracle FPUpdater Tool IMPACT ASSESSMENT: Medium Discussion: The Double.parseDouble method in Java Runtime Environment in Oracle...

  18. Bonneville - Hood River Vegetation Management Environmental Assessment

    SciTech Connect (OSTI)

    N /A

    1998-08-01T23:59:59.000Z

    To maintain the reliability of its electrical system, BPA, in cooperation with the U.S. Forest Service, needs to expand the range of vegetation management options used to clear unwanted vegetation on about 20 miles of BPA transmission line right-of-way between Bonneville Dam and Hood River; Oregon, within the Columbia Gorge National Scenic Area (NSA). We propose to continue controlling undesirable vegetation using a program of Integrated Vegetation Management (IVM) which includes manual, biological and chemical treatment methods. BPA has prepared an Environmental Assessment (EA) (DOE/EA-1257) evaluating the proposed project. Based on the analysis in the EA, BPA has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an Environmental Impact Statement (EIS) is not required and BPA is issuing this FONSI.

  19. Implementing Management Systems-Based Assessments

    SciTech Connect (OSTI)

    Campisi, John A.; Reese, Robert T.

    1999-05-03T23:59:59.000Z

    A management system approach for evaluating environment, safety, health, and quality is in use at Sandia National Laboratories (SNL). Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy under contract DE-AC04-94AL85000. As a multi-program national laboratory, SNL has many diverse operations including research, engineering development and applications, production, and central services supporting all activities and operations. Basic research examples include fusion power generation, nuclear reactor experiments, and investigation of combustion processes. Engineering development examples are design, testing, and prototype developments of micro-mechanical systems for safe'~arding computer systems, air bags for automobiles, satellite systems, design of transportation systems for nuclear materials, and systems for use in medical applications such as diagnostics and surgery. Production operations include manufacture of instrumented detection devices, radioisotopes, and replacement parts for previously produced engineered systems. Support services include facilities engineering, construction, and site management, site security, packaging and transportation of hazardous materials wastes, ES&H functional programs to establish requirements and guidance to comply with federal, state, local, and contractual requirements and work safety. In this diverse environment, unlike more traditional single function business units, an integrated consistent management system is not typical. Instead, each type of diverse activity has its own management system designed and distributed around the operations, personnel, customers, and facilities (e.g., hazards involved, security, regulatory requirements, and locations). Laboratory managers are not likely to have experience in the more traditional hierarchical or command and control structures and thus do not share oversight expectations found in centralized management systems. The resulting corporate management system gives the appearance of an assembly of multiple, nearly independent operating units. The executive management system maintains these separate units, encouraging autonomy and creativity by establishing a minimum of requirements and procedures. In any organization, senior management has a responsibility to ensure that all operating units are meeting requirements. Part of this responsibility is fulfilled by conducting oversight or assurance activities, to determine the effectiveness of established systems in meeting requirements and performance expectations. Internal independent assessment is one of these assurance activities. Independent appraisals are combined with external audits and appraisals, self-assessments, peer reviews, project reviews, and other internal and external audits (e.g., financial, contractual) for a more complete assurance view. At SNL, internal independent appraisals are performed by the Audit Center, which reports directly to the Executive Vice President. ES&H independent appraisals are the responsibility of the ES&H and Quality Assessments Department, with a staff complement of eight. With our organization's charter to perform internal, independent appraisals, we set out to develop an approach and associated tools, which would be useful in the overall SNL environment and within our resource limitations.

  20. An Assessment of Integrated Health Management Frameworks

    SciTech Connect (OSTI)

    Lybeck, Nancy; Coble, Jamie B.; Tawfik, Magdy; Bond, Leonard J.

    2012-05-18T23:59:59.000Z

    In order to meet the ever increasing demand for energy, the United States nuclear industry is turning to life extension of existing nuclear power plants (NPPs). Economically ensuring the safe, secure, and reliable operation of aging NPPs presents many challenges. The 2009 Light Water Reactor Sustainability Workshop identified online monitoring of active and structural components as essential to better understanding and management of the challenges posed by aging NPPs. Additionally, there is increasing adoption of condition-based maintenance (CBM) for active components in NPPs. These techniques provide a foundation upon which a variety of advanced online surveillance, diagnostic, and prognostic techniques can be deployed to continuously monitor and assess the health of NPP systems and components. The next step in the development of advanced online monitoring is to move beyond CBM to estimating the remaining useful life of active components using prognostic tools. Deployment of prognostic health management (PHM) on the scale of an NPP requires the use of an integrated health management (IHM) framework - a software product (or suite of products) used to manage the necessary elements needed for a complete implementation of online monitoring and prognostics. This paper provides a thoughtful look at the desirable functions and features of IHM architectures. A full PHM system involves several modules, including data acquisition, system modeling, fault detection, fault diagnostics, system prognostics, and advisory generation (operations and maintenance planning). The standards applicable to PHM applications are indentified and summarized. A list of evaluation criteria for PHM software products, developed to ensure scalability of the toolset to an environment with the complexity of an NPP, is presented. Fourteen commercially available PHM software products are identified and classified into four groups: research tools, PHM system development tools, deployable architectures, and peripheral tools.

  1. Save Energy Now Assessment Helps Expand Energy Management Program...

    Broader source: Energy.gov (indexed) [DOE]

    identify significant energy savings opportunities in their Dalton, Georgia, plant's steam system. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw...

  2. DOE's New Checklist Helps Plants Assess Energy Management Activities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    simple checklist can help a facility assess whether Superior Energy Performance (SEP) or ISO 50001 are practical next steps, or if foundational energy management activities...

  3. Risk Assessment & Management This chapter presents the Council's approach to addressing uncertainty and managing risk. After

    E-Print Network [OSTI]

    Risk Assessment & Management This chapter presents the Council's approach to addressing uncertainty and managing risk. After reviewing the reasons for addressing uncertainty in the Council's Fifth Power Plan favor going ahead. In this plan, the Council further integrates risk assessment and management into its

  4. An Open-Source Learning Content Management and Assessment System

    E-Print Network [OSTI]

    LON-CAPA An Open-Source Learning Content Management and Assessment System Gerd Kortemeyer-CAPA is free open-source a learning content management system an assessment system around since 1992 #12 Cross-Institutional Resource Library (Base de Dados Compartilhada entre Instituições) Resource Assembly

  5. Environmental Management Assessment of the National Renewable Energy Laboratory (NREL)

    SciTech Connect (OSTI)

    Not Available

    1993-09-01T23:59:59.000Z

    This report documents the results of the environmental management assessment performed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. The onsite portion of the assessment was conducted from September 14 through September 27, 1993, by DOE`s Office of Environmental Audit (EH-24) located within the Office of the Assistant Secretary for Environment, Safety, and Health (EH-1). During this assessment, the activities conducted by the assessment team included reviews of internal documents and reports from previous audits and assessments; interviews with US Department of Energy (DOE) and NREL contractor personnel; and inspections and observations of selected facilities and operations. The environmental management assessment of NREL focused on the adequacy of environmental management systems and assessed the formality of programs employing an approach that recognizes the level of formality implementing environmental programs may vary commensurate with non-nuclear research and development operations. The Assessment Team evaluated environmental monitoring, waste management and National Environmental Policy Act (NEPA) activities at NREL, from a programmatic standpoint. The results of the evaluation of these areas are contained in the Environmental Protection Programs section of this report. The scope of the NREL Environmental Management Assessment was comprehensive and included all areas of environmental management. At the same time, environmental monitoring, waste management, and NEPA activities were evaluated to develop a programmatic understanding of these environmental disciplines, building upon the results of previous appraisals, audits, and reviews performed at the NREL.

  6. Protocols for conducting Environmental Management Assessments of DOE organizations

    SciTech Connect (OSTI)

    Not Available

    1993-08-01T23:59:59.000Z

    To assess the effectiveness of DOE`s environmental programs, the Office of Environmental Audit conducts Environmental Management Assessments of DOE programs and facilities. These assessments take a broad programmatic view of environmental systems which may cover multiple sites. The focus of the assessment is on the infrastructure, systems, programs, and tools to manage environmental issues, not on the compliance issues themselves. Protocols have been developed to assist in the conduct of Environmental Management Assessments. The protocols are, based on and serve as implementing guidelines for the Environmental Management Section of ``Performance Objectives and Criteria for Conducting DOE Environmental Audits`` (DOE/EH-022). They are intended to provide guidance to the Assessment Team in conducting these reviews.

  7. Ann Williamson, Deputy Director, Office of Environmental Assessment Mike Cox, Manager, Risk Assessment Unit, Office of Environmental Assessment

    E-Print Network [OSTI]

    Ann Williamson, Deputy Director, Office of Environmental Assessment Mike Cox, Manager, Risk Assessment Unit, Office of Environmental Assessment U.S. Environmental Protection Agency ­ Region 10 Greg, WA Ann Williamson and Mike Cox, EPA Region 10 Office of Environmental Assessment, will be presenting

  8. COMPARATIVE HEALTH IMPACT ASSESSMENTS ON FECAL SLUDGE MANAGEMENT PRACTICES

    E-Print Network [OSTI]

    Richner, Heinz

    i COMPARATIVE HEALTH IMPACT ASSESSMENTS ON FECAL SLUDGE MANAGEMENT PRACTICES: A CASE STUDY OF KLONG Fecal sludge (FS) is widely acknowledged as a major source of infectious pathogens. However, the proper

  9. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Broader source: Energy.gov (indexed) [DOE]

    DMZs, the corporate network, and the outside. In an on-site assessment, while scanning for vulnerabilities on the CS network, the assessment team discovered IP addresses...

  10. 1A Appendix A--Statewide Management Assessment of Invasive Species in Oregon APPENDIX A. OREGON STATEWIDE MANAGEMENT ASSESSMENT OF INVASIVE SPECIES SURVEY

    E-Print Network [OSTI]

    STATEWIDE MANAGEMENT ASSESSMENT OF INVASIVE SPECIES SURVEY OISC Statewide Management Assessment of Invasive will not be shared. Rather, survey responses will be compiled as part of this statewide management assessment Species Survey and Management Question 2 If you conducted invasive species work in your fiscal year 2008

  11. An Open-Source Learning Content Management and Assessment System

    E-Print Network [OSTI]

    LON-CAPA An Open-Source Learning Content Management and Assessment System Gerd Kortemeyer Michigan system an assessment system around since 1992 #12;Free and Open-Source · Free: "Free beer=split(/\\,/,$line); $username=$entries[4]; _ #12;Campus A Campus B LON-CAPA Architecture Shared Cross-Institutional Resource

  12. Risk assessment and management of radiofrequency radiation exposure

    SciTech Connect (OSTI)

    Dabala, Dana [Railways Medical Clinic Cluj-Napoca, Occupational Medicine Department, 16-20 Bilascu Gheorghe St., 400015 Cluj-Napoca (Romania)] [Railways Medical Clinic Cluj-Napoca, Occupational Medicine Department, 16-20 Bilascu Gheorghe St., 400015 Cluj-Napoca (Romania); Surducan, Emanoil; Surducan, Vasile; Neamtu, Camelia [National Institute for Research and Development of Isotopic and Molecular Technologies, 65-103 Donath St., 400293 Cluj-Napoca (Romania)] [National Institute for Research and Development of Isotopic and Molecular Technologies, 65-103 Donath St., 400293 Cluj-Napoca (Romania)

    2013-11-13T23:59:59.000Z

    Radiofrequency radiation (RFR) industry managers, occupational physicians, security department, and other practitioners must be advised on the basic of biophysics and the health effects of RF electromagnetic fields so as to guide the management of exposure. Information on biophysics of RFR and biological/heath effects is derived from standard texts, literature and clinical experiences. Emergency treatment and ongoing care is outlined, with clinical approach integrating the circumstances of exposure and the patient's symptoms. Experimental risk assessment model in RFR chronic exposure is proposed. Planning for assessment and monitoring exposure, ongoing care, safety measures and work protection are outlining the proper management.

  13. Dredging/dredged material management risk assessment. Technical note

    SciTech Connect (OSTI)

    NONE

    1998-09-01T23:59:59.000Z

    This technical note explains the use of risk assessment to facilitate dredged material management decision-making in navigable waterways by US Army Corps of Engineer (USACE) project managers and field operations personnel. The document does not promote risk assessment as a tool for use in every dredged material management decision. It is likely to be most useful, and most used, in those cases that constitute the exception rather than the rule. The use of risk assessment is intended to supplement the analytical options currently available to dredged material managers by building on the existing technical framework (US Environmental Protection Agency (USEPA)/USACE 1992) and the existing tiered approaches (USEPA/USACE 1991, 1998).

  14. DECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL

    E-Print Network [OSTI]

    Wang, Hai

    , telecommunications, water supply, wastewater, electric power and other energy infrastructure. Event databasesDECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL INFRASTRUCTURE Zimmerman, R interdependencies, extreme events, vulnerability assessment 1 Introduction The provision of infrastructure services

  15. NGNP Risk Management through Assessing Technology Readiness

    SciTech Connect (OSTI)

    John W. Collins

    2010-08-01T23:59:59.000Z

    Throughout the Next Generation Nuclear Plant (NGNP) project life cycle, technical risks are identified, analyzed, and mitigated and decisions are made regarding the design and selection of plant and sub-system configurations, components and their fabrication materials, and operating conditions. Risk resolution and decision making are key elements that help achieve project completion within budget and schedule constraints and desired plant availability. To achieve this objective, a formal decision-making and risk management process was developed for NGNP, based on proven systems engineering principles that have guided aerospace and military applications.

  16. FLEXIBILITY IN WATER RESOURCES MANAGEMENT: REVIEW OF CONCEPTS AND DEVELOPMENT OF ASSESSMENT MEASURES FOR FLOOD MANAGEMENT SYSTEMS1

    E-Print Network [OSTI]

    Tullos, Desiree

    FLEXIBILITY IN WATER RESOURCES MANAGEMENT: REVIEW OF CONCEPTS AND DEVELOPMENT OF ASSESSMENT variability/change; risk assessment; flood management; water resources flexibility.) DiFrancesco, Kara N of Assessment Measures for Flood Management Systems. Journal of the American Water Resources Association (JAWRA

  17. Assessing quality management in an R and D environment

    SciTech Connect (OSTI)

    Thompson, B.D.

    1998-02-01T23:59:59.000Z

    Los Alamos National Laboratory (LANL) is a premier research and development institution operated by the University of California for the US Department of Energy. Since 1991, LANL has pursued a heightened commitment to developing world-class quality in management and operations. In 1994 LANL adopted the Malcolm Baldrige National Quality Award criteria as a framework for all activities and initiated more formalized customer focus and quality management. Five measurement systems drive the current integration of quality efforts: an annual Baldrige-based assessment, a customer focus program, customer-driven performance measurement, an employee performance management system and annual employee surveys, and integrated planning processes with associated goals and measures.

  18. SDSS Data Management and Photometric Quality Assessment

    E-Print Network [OSTI]

    Z. Ivezic; R. H. Lupton; D. Schlegel; B. Boroski; J. Adelman-McCarthy; B. Yanny; S. Kent; C. Stoughton; D. Finkbeiner; N. Padmanabhan; C. M. Rockosi; J. E. Gunn; G. R. Knapp; M. A. Strauss; G. T. Richards; D. Eisenstein; T. Nicinski; S. J. Kleinman; J. Krzesinski; P. R. Newman; S. Snedden; A. R. Thakar; A. Szalay; J. A. Munn; J. A. Smith; D. Tucker; B. C. Lee

    2004-10-07T23:59:59.000Z

    We summarize the Sloan Digital Sky Survey data acquisition and processing steps, and describe runQA, a pipeline designed for automated data quality assessment. In particular, we show how the position of the stellar locus in color-color diagrams can be used to estimate the accuracy of photometric zeropoint calibration to better than 0.01 mag in 0.03 deg2 patches. Using this method, we estimate that typical photometric zeropoint calibration errors for SDSS imaging data are not larger than ~0.01 mag in the g, r, and i bands, 0.02 mag in the z band, and 0.03 mag in the u band (root-mean-scatter for zeropoint offsets).

  19. Risk assessment methodology provides the framework for rational manage-

    E-Print Network [OSTI]

    Risk assessment methodology provides the framework for rational manage- ment of the risks from): RECOMMENDATIONS 8 SCIENTIFICRESEARCHCAUCUSSTATEMENT Weddell seals locate breathing holes by listening for cracking and the potential impacts of noise on marine mammals. These additional sources of support are impor- tant

  20. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  1. Vulnerability Scanning Policy 1 Introduction

    E-Print Network [OSTI]

    Vulnerability Scanning Policy 1 Introduction Vulnerability scanning is an important and necessary and can alert system administrators to potentially serious problems. However vulnerability scanning also to compromise system security. The following policy details the conditions under which vulnerability scans may

  2. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01T23:59:59.000Z

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

  3. Assessment of Disposal Options for DOE-Managed High-Level Radioactive...

    Energy Savers [EERE]

    Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and Spent Nuclear Fuel Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and...

  4. The Paradoxes of Military Risk Assessment: Will the Enterprise Risk Assessment Model, Composite Risk Management and Associated

    E-Print Network [OSTI]

    Johnson, Chris

    to assess the nation's military preparedness. However, risk management is not a panacea for the problemsThe Paradoxes of Military Risk Assessment: Will the Enterprise Risk Assessment Model, Composite Risk Management and Associated Techniques Provide the Predicted Benefits? Chris. W. Johnson, Glasgow

  5. Conceptualising and managing trade-offs in sustainability assessment

    SciTech Connect (OSTI)

    Morrison-Saunders, Angus, E-mail: A.Morrison-Saunders@murdoch.edu.au [School of Geo and Spatial Sciences, North West University (South Africa); School of Environmental Science, Murdoch University (Australia); Pope, Jenny [School of Geo and Spatial Sciences, North West University (South Africa); Integral Sustainability (Australia); Curtin University (Australia)

    2013-01-15T23:59:59.000Z

    One of the defining characteristics of sustainability assessment as a form of impact assessment is that it provides a forum for the explicit consideration of the trade-offs that are inherent in complex decision-making processes. Few sustainability assessments have achieved this goal though, and none has considered trade-offs in a holistic fashion throughout the process. Recent contributions such as the Gibson trade-off rules have significantly progressed thinking in this area by suggesting appropriate acceptability criteria for evaluating substantive trade-offs arising from proposed development, as well as process rules for how evaluations of acceptability should occur. However, there has been negligible uptake of these rules in practice. Overall, we argue that there is inadequate consideration of trade-offs, both process and substantive, throughout the sustainability assessment process, and insufficient considerations of how process decisions and compromises influence substantive outcomes. This paper presents a framework for understanding and managing both process and substantive trade-offs within each step of a typical sustainability assessment process. The framework draws together previously published literature and offers case studies that illustrate aspects of the practical application of the framework. The framing and design of sustainability assessment are vitally important, as process compromises or trade-offs can have substantive consequences in terms of sustainability outcomes delivered, with the choice of alternatives considered being a particularly significant determinant of substantive outcomes. The demarcation of acceptable from unacceptable impacts is a key aspect of managing trade-offs. Offsets can be considered as a form of trade-off within a category of sustainability that are utilised to enhance preferred alternatives once conditions of impact acceptability have been met. In this way they may enable net gains to be delivered; another imperative for progress to sustainability. Understanding the nature and implications of trade-offs within sustainability assessment is essential to improving practice. - Highlights: Black-Right-Pointing-Pointer A framework for understanding trade-offs in sustainability assessment is presented. Black-Right-Pointing-Pointer Trade-offs should be considered as early as possible in any sustainability assessment process. Black-Right-Pointing-Pointer Demarcation of acceptable from unacceptable impacts is needed for effective trade-off management. Black-Right-Pointing-Pointer Offsets in place, time or kind can ensure and attain a net benefit outcome overall. Black-Right-Pointing-Pointer Gibson's trade-off rules provide useful acceptability criteria and process guidance.

  6. Empirical Estimates and Observations of 0Day Vulnerabilities

    SciTech Connect (OSTI)

    Miles A. McQueen; Trevor A. McQueen; Wayne F. Boyer; May R. Chaffin

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to a system from exploit of vulnerabilities which are not generally known to the public or, most importantly, to the owners of the system. Using the 0Day definition given above, we analyzed the 0Day lifespans of 491 vulnerabilities and conservatively estimated that in the worst year there were on average 2500 0Day vulnerabilities in existence on any given day. Then using a small but intriguing set of 15 0Day vulnerability lifespans representing the time from actual discovery to public disclosure, we made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day vulnerabilities in existence on any given day.

  7. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01T23:59:59.000Z

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  8. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgramSCADA

  9. What life-cycle assessment does and does not do in assessments of waste management

    SciTech Connect (OSTI)

    Ekvall, Tomas [IVL Swedish Environmental Research Institute, P.O. Box 5302, SE-400 14 Goeteborg (Sweden)], E-mail: tomas.ekvall@ivl.se; Assefa, Getachew [Industrial Ecology, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden); Bjoerklund, Anna [Environmental Strategies Research - FMS, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden); Eriksson, Ola [Technology and Built Environment, University of Gaevle, SE-801 76 Gaevle (Sweden); Finnveden, Goeran [Environmental Strategies Research - FMS, Royal Institute of Technology (KTH), SE-100 44 Stockholm (Sweden)

    2007-07-01T23:59:59.000Z

    In assessments of the environmental impacts of waste management, life-cycle assessment (LCA) helps expanding the perspective beyond the waste management system. This is important, since the indirect environmental impacts caused by surrounding systems, such as energy and material production, often override the direct impacts of the waste management system itself. However, the applicability of LCA for waste management planning and policy-making is restricted by certain limitations, some of which are characteristics inherent to LCA methodology as such, and some of which are relevant specifically in the context of waste management. Several of them are relevant also for other types of systems analysis. We have identified and discussed such characteristics with regard to how they may restrict the applicability of LCA in the context of waste management. Efforts to improve LCA with regard to these aspects are also described. We also identify what other tools are available for investigating issues that cannot be adequately dealt with by traditional LCA models, and discuss whether LCA methodology should be expanded rather than complemented by other tools to increase its scope and applicability.

  10. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  11. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wolfsberg, Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Macknick, Jordan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Middleton, Richard [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-01T23:59:59.000Z

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  12. Survey Research Methodology in Management Information Systems: An Assessment

    E-Print Network [OSTI]

    Pinsonneault, Alain; Kraemer, Kenneth L.

    1993-01-01T23:59:59.000Z

    Management. 181-186. A survey. Management the impact onskill requirements: A survey. Management Information SystemsManagement Information Systems Research Challenge: Survey

  13. How social impact assessment can contribute to conflict management

    SciTech Connect (OSTI)

    Prenzel, Paula V., E-mail: p.v.prenzel@student.rug.nl; Vanclay, Frank, E-mail: frank.vanclay@rug.nl

    2014-02-15T23:59:59.000Z

    The potential for conflict is omnipresent in all projects, and even in all human interactions, and conflict itself leads to many second-order social impacts. This article examines the contribution of the methodological approach used in social impact assessment (SIA) to conflict management. We view conflict as a process that has its own dynamic, and is to be expected in all situations. By using game theory (prisoner's dilemma), we describe and conceptualize this process and highlight the importance of communication in managing conflict. We demonstrate the potential use of SIA in preventing, managing and resolving conflict. Emphasis is placed on the participatory character of SIA and the role of public media. In contrast to existing literature, our focus is not restricted to the typical fields of study of SIA (e.g. environmental conflicts), but understands conflict itself as a field of application. In this sense, conflict-sensitive SIA can be understood both as an extension to the SIA tool kit and a broadening of the scope of SIA application. -- Highlights: • Conflict is omnipresent and creates both positive and negative social impacts. • Conflict itself represents a possible field of application for SIA. • Conflict escalation is a process that can be modeled in a game-theoretic framework. • There needs to be concerted effort to prevent escalation to avoid harmful outcomes. • Conflict-sensitive SIA can support conflict management and sustainable resolution.

  14. Office of Emergency Management Assessments | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732onMake YourDepartment ofC T O BEmergency Management Assessments

  15. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities

    E-Print Network [OSTI]

    Narasayya, Vivek

    programs by exploiting browser vulnerabilities are a serious emerging threat. In response, we have-management methodology to cybersecurity: instead of directly detecting the acts of vulnerability exploits, the system

  16. An Assessment of Integrated Health Management (IHM) Frameworks

    SciTech Connect (OSTI)

    N. Lybeck; M. Tawfik; L. Bond; J. Coble

    2012-05-01T23:59:59.000Z

    In order to meet the ever increasing demand for energy, the United States nuclear industry is turning to life extension of existing nuclear power plants (NPPs). Economically ensuring the safe, secure, and reliable operation of aging nuclear power plants presents many challenges. The 2009 Light Water Reactor Sustainability Workshop identified online monitoring of active and structural components as essential to the better understanding and management of the challenges posed by aging nuclear power plants. Additionally, there is increasing adoption of condition-based maintenance (CBM) for active components in NPPs. These techniques provide a foundation upon which a variety of advanced online surveillance, diagnostic, and prognostic techniques can be deployed to continuously monitor and assess the health of NPP systems and components. The next step in the development of advanced online monitoring is to move beyond CBM to estimating the remaining useful life of active components using prognostic tools. Deployment of prognostic health management (PHM) on the scale of a NPP requires the use of an integrated health management (IHM) framework - a software product (or suite of products) used to manage the necessary elements needed for a complete implementation of online monitoring and prognostics. This paper provides a thoughtful look at the desirable functions and features of IHM architectures. A full PHM system involves several modules, including data acquisition, system modeling, fault detection, fault diagnostics, system prognostics, and advisory generation (operations and maintenance planning). The standards applicable to PHM applications are indentified and summarized. A list of evaluation criteria for PHM software products, developed to ensure scalability of the toolset to an environment with the complexity of a NPP, is presented. Fourteen commercially available PHM software products are identified and classified into four groups: research tools, PHM system development tools, deployable architectures, and peripheral tools.

  17. Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011 The following) section on Chemical-Terrorism Vulnerability Information (CVI) 6 CFR 27.400. The Program Manager's comments.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating

  18. Waste Management Recommendations in the Texas A&M University Industrial Assessment Center Program

    E-Print Network [OSTI]

    Eggebrecht, J. A.; Heffington, W. M.

    The Texas A&M University Industrial Assessment Center (IAC) was one of the four Energy Analysis & Diagnostic Centers (EADC) that began providing waste management, in addition to energy and demand conservation, assessments in January, 1994. Over 30...

  19. Life cycle assessment of bagasse waste management options

    SciTech Connect (OSTI)

    Kiatkittipong, Worapon [Department of Chemical Engineering, Faculty of Engineering and Industrial Technology, Silpakorn University, Nakhon Pathom 73000 (Thailand); National Center of Excellence for Environmental and Hazardous Waste Management, Chulalongkorn University, Bangkok 10330 (Thailand); Wongsuchoto, Porntip [National Center of Excellence for Environmental and Hazardous Waste Management, Chulalongkorn University, Bangkok 10330 (Thailand); Pavasant, Prasert [National Center of Excellence for Environmental and Hazardous Waste Management, Chulalongkorn University, Bangkok 10330 (Thailand); Department of Chemical Engineering, Faculty of Engineering, Chulalongkorn University, Bangkok 10330 (Thailand)], E-mail: prasert.p@chula.ac.th

    2009-05-15T23:59:59.000Z

    Bagasse is mostly utilized for steam and power production for domestic sugar mills. There have been a number of alternatives that could well be applied to manage bagasse, such as pulp production, conversion to biogas and electricity production. The selection of proper alternatives depends significantly on the appropriateness of the technology both from the technical and the environmental points of view. This work proposes a simple model based on the application of life cycle assessment (LCA) to evaluate the environmental impacts of various alternatives for dealing with bagasse waste. The environmental aspects of concern included global warming potential, acidification potential, eutrophication potential and photochemical oxidant creation. Four waste management scenarios for bagasse were evaluated: landfilling with utilization of landfill gas, anaerobic digestion with biogas production, incineration for power generation, and pulp production. In landfills, environmental impacts depended significantly on the biogas collection efficiency, whereas incineration of bagasse to electricity in the power plant showed better environmental performance than that of conventional low biogas collection efficiency landfills. Anaerobic digestion of bagasse in a control biogas reactor was superior to the other two energy generation options in all environmental aspects. Although the use of bagasse in pulp mills created relatively high environmental burdens, the results from the LCA revealed that other stages of the life cycle produced relatively small impacts and that this option might be the most environmentally benign alternative.

  20. Final Environmental assessment for the Uranium Lease Management Program

    SciTech Connect (OSTI)

    NONE

    1995-07-01T23:59:59.000Z

    The US Department of Energy (DOE) has prepared a programmatic environmental assessment (EA) of the proposed action to continue leasing withdrawn lands and DOE-owned patented claims for the exploration and production of uranium and vanadium ores. The Domestic Uranium Program regulation, codified at Title 10, Part 760.1, of the US Code of Federal Regulations (CFR), gives DOE the flexibility to continue leasing these lands under the Uranium Lease Management Program (ULMP) if the agency determines that it is in its best interest to do so. A key element in determining what is in DOE`s ``best interest`` is the assessment of the environmental impacts that may be attributable to lease tract operations and associated activities. On the basis of the information and analyses presented in the EA for the ULMP, DOE has determined that the proposed action does not constitute a major Federal action significantly affecting the quality of the human environment, as defined in the National Environmental Policy Act (NEPA) of 1969 (42 United States Code 4321 et seq.), as amended.Therefore, preparation of an environmental impact statement is not required for the ULMP,and DOE is issuing this Finding, of No Significant Impact (FONSI).

  1. assessing biodiversity management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    24 25 Next Page Last Page Topic Index 281 Density Management In Pacific Northwest Forests Renewable Energy Websites Summary: lands Emphasis on managing for biodiversity and...

  2. Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume 2, Appendix A: Process and protocol

    SciTech Connect (OSTI)

    NONE

    1994-09-01T23:59:59.000Z

    This appendix contains documentation prepared by the Plutonium ES and H Vulnerability Working Group for conducting the Plutonium ES and H Vulnerability Assessment and training the assessment teams. It has the following five parts. (1) The Project Plan describes the genesis of the project, sets forth the goals, objectives and scope, provides definitions, the projected schedule, and elements of protocol. (2) The Assessment Plan provides a detailed methodology necessary to guide the many professionals who have been recruited to conduct the DOE-wide assessment. It provides guidance on which types and forms of plutonium are to be considered within the scope of the assessment, and lays out the assessment methodology to be used. (3) The memorandum from the Project to Operations Office Managers provides the protocol and direction for participation in the assessment by external stakeholders and members of the public; and the guidance for the physical inspection of plutonium materials in storage. (4) The memorandum from the Project to the assessment teams provides guidance for vulnerability screening criteria, vulnerability evaluation and prioritization process, and vulnerability quantification for prioritization. (5) The Team Training manual was used at the training session held in Colorado Springs on April 19--21, 1994 for all members of the Working Group Assessment Teams and for the leaders of the Site Assessment Teams. The goal was to provide the same training to all of the individuals who would be conducting the assessments, and thereby provide consistency in the conduct of the assessments and uniformity in reporting of the results. The training manual in Section A.5 includes supplemental material provided to the attendees after the meeting.

  3. Assessment of Managed Aquifer Recharge Site Suitability Using a GIS and Modeling

    E-Print Network [OSTI]

    Fisher, Andrew

    with a regional groundwater model to assess the hydrologic impact of potential MAR placement and operating planning, including evaluation of options for enhancing groundwater resources. Introduction ManagedAssessment of Managed Aquifer Recharge Site Suitability Using a GIS and Modeling by Tess A. Russo1

  4. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01T23:59:59.000Z

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  5. Assessment of Brine Management for Geologic Carbon Sequestration

    E-Print Network [OSTI]

    Breunig, Hanna M.

    2014-01-01T23:59:59.000Z

    water  management  options,  including:  geothermal  energy   extraction,  desalination,  salt  and  mineral   harvesting,  

  6. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01T23:59:59.000Z

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  7. New Dimensions of Visual Landscape Assessment Wildlands Management for Wildlife Viewing1

    E-Print Network [OSTI]

    Standiford, Richard B.

    preservation and other activities associated with traditional game management. Fortunately, much of the knowledge and techniques developed for game #12;management can be transferred to considerations of wildlifeNew Dimensions of Visual Landscape Assessment Wildlands Management for Wildlife Viewing1 Tamsie

  8. assessing quality management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quality Assessment and Recommended Objectives for the Multidisciplinary Databases and Resources Websites Summary: Water Quality Assessment and Recommended Objectives for the...

  9. A National Assessment of the Intrastructure for Urban Wildlife Management

    E-Print Network [OSTI]

    Murphy, Michaela Rene

    2014-08-01T23:59:59.000Z

    ecosystems. Universities and state wildlife agencies are the main driving forces for research and management, and it is crucial that these institutions provide support for managing wildlife in urban environments. Universities (n = 73) and state wildlife...

  10. Cost Quality Management Assessment for the Idaho Operations Office. Final report

    SciTech Connect (OSTI)

    NONE

    1995-06-01T23:59:59.000Z

    The Office of Engineering and Cost Management (EM-24) conducted a Cost Quality Management Assessment of EM-30 and EM-40 activities at the Idaho National Engineering Laboratory on Feb. 3--19, 1992 (Round I). The CQMA team assessed the cost and cost-related management activities at INEL. The Round II CQMA, conducted at INEL Sept. 19--29, 1994, reviewed EM-30, EM-40, EM-50, and EM-60 cost and cost-related management practices against performance objectives and criteria. Round II did not address indirect cost analysis. INEL has made measurable progress since Round I.

  11. Environmental management assessment of the Waste Isolation Pilot Plant (WIPP), Carlsbad, New Mexico

    SciTech Connect (OSTI)

    Not Available

    1993-07-01T23:59:59.000Z

    This document contains the results of the Environmental Management Assessment of the Waste Isolation Pilot Plant (WIPP). This Assessment was conducted by EH-24 from July 19 through July 30, 1993 to advise the Secretary of Energy of the adequacy of management systems established at WIPP to ensure the protection of the environment and compliance with Federal, state, and DOE environmental requirements. The mission of WIPP is to demonstrate the safe disposal of transuranic (TRU) waste. During this assessment, activities and records were reviewed and interviews were conducted with personnel from the management and operating contractors. This assessment revealed that WIPP`s environmental safety and health programs are satisfactory, and that all levels of the Waste Isolation Division (WID) management and staff consistently exhibit a high level of commitment to achieve environmental excellence.

  12. PPPO-02-427-07 Revised Solid Waste Management Unit Assessment...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5&D1 Secondary Document Staging Area for Concrete Piers, Rubble, and Wood on the North Side of C-745-B Cylinder Yard Solid Waste Management Unit Assessment Report UNIT NUMBER: 548...

  13. Fiscal Year 2007 Civilian Radioactive Waste Management Fee Adequacy Assessment Report

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Office of Civilian Radioactive Waste Management Fee Adequacy Assessment Report is to present an analysis of the adequacy of the fee being paid by nuclear power utilities...

  14. Senior Technical Safety Manager Qualification Program Self-Assessment- Chief of Nuclear Safety

    Broader source: Energy.gov [DOE]

    This Chief of Nuclear Safety (CNS) Report was prepared to summarize the results of the July 2013 CNS self-assessment of the Senior Technical Safety Manager Qualification Program.

  15. Development and initial assessment of Texas Cooperative Extension's white-tailed dear management module

    E-Print Network [OSTI]

    Bedgood, Mark Andrew

    2005-02-17T23:59:59.000Z

    DEVELOPMENT AND INITIAL ASSESSMENT OF TEXAS COOPERATIVE EXTENSION?S WHITE-TAILED DEER MANAGEMENT MODULE A Thesis by MARK ANDREW BEDGOOD Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE December 2004 Major Subject: Agricultural Education DEVELOPMENT AND INITIAL ASSESSMENT OF TEXAS COOPERATIVE EXTENSION?S WHITE-TAILED DEER MANAGEMENT MODULE A Thesis by MARK ANDREW...

  16. Assessment groundwater monitoring plan for single shell tank waste management area B-BX-BY

    SciTech Connect (OSTI)

    Caggiano, J.A.

    1996-09-27T23:59:59.000Z

    Single Shell Tank Waste Management Area B-BX-BY has been placed into groundwater quality assessment monitoring under interim-status regulations. This document presents background and an assessment groundwater monitoring plan to evaluate any impacts of risks/spills from these Single Shell Tanks in WMA B-BX-BY on groundwater quality.

  17. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  18. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

  19. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01T23:59:59.000Z

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  20. A framework for the assessment of severe accident management strategies

    SciTech Connect (OSTI)

    Kastenberg, W.E. [ed.; Apostolakis, G.; Dhir, V.K. [California Univ., Los Angeles, CA (United States). Dept. of Mechanical, Aerospace and Nuclear Engineering] [and others

    1993-09-01T23:59:59.000Z

    Severe accident management can be defined as the use of existing and/or altemative resources, systems and actors to prevent or mitigate a core-melt accident. For each accident sequence and each combination of severe accident management strategies, there may be several options available to the operator, and each involves phenomenological and operational considerations regarding uncertainty. Operational uncertainties include operator, system and instrumentation behavior during an accident. A framework based on decision trees and influence diagrams has been developed which incorporates such criteria as feasibility, effectiveness, and adverse effects, for evaluating potential severe accident management strategies. The framework is also capable of propagating both data and model uncertainty. It is applied to several potential strategies including PWR cavity flooding, BWR drywell flooding, PWR depressurization and PWR feed and bleed.

  1. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  2. Assessment of public perception of radioactive waste management in Korea.

    SciTech Connect (OSTI)

    Trone, Janis R.; Cho, SeongKyung (Myongji University, Korea); Whang, Jooho (Kyung Hee University, Korea); Lee, Moo Yul

    2011-11-01T23:59:59.000Z

    The essential characteristics of the issue of radioactive waste management can be conceptualized as complex, with a variety of facets and uncertainty. These characteristics tend to cause people to perceive the issue of radioactive waste management as a 'risk'. This study was initiated in response to a desire to understand the perceptions of risk that the Korean public holds towards radioactive waste and the relevant policies and policy-making processes. The study further attempts to identify the factors influencing risk perceptions and the relationships between risk perception and social acceptance.

  3. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report

    SciTech Connect (OSTI)

    NONE

    1994-09-01T23:59:59.000Z

    This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

  4. An Open-Source Learning Content Management and Assessment System

    E-Print Network [OSTI]

    ;Campus A Campus B LON-CAPA Architecture Shared Cross-Institutional Resource Library (Base de Dados Assembly Course Management LON-CAPA Architecture Shared Cross-Institutional Resource Library (Base de Dados module about energy conservation Writes module about momentum conservation Compiles module about

  5. EIS-0220: Interim Management of Nuclear Materials at the Savannah River Site

    Broader source: Energy.gov [DOE]

    This environmental impact statement assesses the potential environmental impacts of actions necessary to manage nuclear materials at the Savannah River Site (SRS) in Aiken, South Carolina, until decisions on their ultimate disposition are made and implemented. The Department of Energy has decided to initiate actions which will stabilize certain of the SRS materials that represent environment, safety and health vulnerabilities in their current storage condition or which may represent a vulnerability within the next 10 years.

  6. Puget Sound Dredged Disposal Analysis: Management plan assessment report. Dredged Material Management Year 1990

    SciTech Connect (OSTI)

    Not Available

    1991-03-01T23:59:59.000Z

    Puget Sound Dredged Disposal Analysis (PSDDA) is an interagency program for the management of unconfined, open-water disposal of dredged material into Puget Sound, Washington. The Management Plans for the PSDDA program identify disposal sites, describe dredged material evaluation procedures, and establish site monitoring and management practices. The plans also commit the involved agencies to a cooperative annual review process which evaluates disposal site use and conditions, dredged material testing results, and new scientific information, in order to determine if changes to the evaluation procedures and/or disposal site management practices are needed. Sampling was conducted to determine any chemical/biological contamination.

  7. Natural resource management activities at the Savannah River Site. Environmental Assessment

    SciTech Connect (OSTI)

    Not Available

    1993-07-01T23:59:59.000Z

    This environmental assessment (EA) reviews the environmental consequences of ongoing natural resource management activities on the Savannah River Site (SRS). Appendix A contains the Natural Resources Management Plant (NRMP). While several SRS organizations have primary responsibilities for different elements of the plan, the United States Department of Agriculture (USDA), Forest Service, Savannah River Forest Station (SRFS) is responsible for most elements. Of the river scenarios defined in 1985, the High-Intensity Management alternative established the upper bound of environmental consequences; it represents a more intense level of resource management than that being performed under current resource management activities. This alternative established compliance mechanisms for several natural resource-related requirements and maximum practical timber harvesting. Similarly, the Low-Intensity Management alternative established the lower bound of environmental consequences and represents a less intense level of resource management than that being performed under current resource management activities. This alternative also established compliance mechanisms, but defined a passively managed natural area. The Proposed Action of this EA describes the current level of multiple-natural resource management. This EA reviews the proposed action, and the high and low intensity alternative scenarios.

  8. Manager's Signature Log Privacy Impact Assessment, Office of Science

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732onMake Your Next Road Trip Fuel Efficient MakeManagementChicago

  9. RCRA Assessment Plan for Single-Shell Tank Waste Management Area A-AX at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, Susan M.; Chou, Charissa J.

    2006-03-03T23:59:59.000Z

    This document describes a groundwater assessment plan for the single-shell tank systems in Waste Management Area A-AX at the Hanford Site.

  10. Oilfield property development: Risk assessment, management and control

    SciTech Connect (OSTI)

    Robertson, M.; Robles, H.; Manweiler, D. [Environmental Science & Engineering, Inc., Fountain Valley, CA (United States)

    1996-08-01T23:59:59.000Z

    Several regulatory authorities in California have developed new regulations/guidelines for oilfield remediation and subsequent development. The sole intent of the new regulations/guidelines is to protect public health; however, these efforts are often misdirected. In fact, many of the regulations/guidelines impose remediation or construction standards that, in effect, render the development of such properties impractical. These standards include or require stringent contaminant cleanup standards, minimum development setbacks from active and abandoned wells, natural-gas venting provisions for abandoned wells, and the widespread use of soil-gas barriers. Clearly, these regulatory changes have been made without due consideration of risk. Because, in actuality, the risks posed by former oilfield properties are insignificant when compared to other non- oilfield properties. The history of oilfield development in Southern California has shown that although some physical and chemical hazards do exist, oilfield development, properly managed, can usually be accomplished with acceptable residual risk. Rigid control measures, based on inaccurate assumptions, merely inhibit the useful development of valuable property and misdirect resources that could be more effectively applied where the risks are real and significant. To protect public health and allow for efficient resource allocation, risk control measures must be both adequate and proportional to the actual health risks and hazards posed. This paper reviews the history of oil production in Southern California, explains the known health risks associated with oilfield property development, and describes a risk management approach that will address these risks at an acceptable cost.

  11. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01T23:59:59.000Z

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  12. Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment

    SciTech Connect (OSTI)

    Irving, John S

    2003-04-01T23:59:59.000Z

    DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

  13. Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment - April 2003

    SciTech Connect (OSTI)

    Irving, J.S.

    2003-04-30T23:59:59.000Z

    DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

  14. Environmental Assessment/Regulatory Impact Review AMENDMENT 45 TO THE FISHERY MANAGEMENT PLAN

    E-Print Network [OSTI]

    Environmental Assessment/Regulatory Impact Review FOR AMENDMENT 45 TO THE FISHERY MANAGEMENT PLAN it would conflict with the Bering Sea non-roe season. At its January 1996 meeting, the Council considered/C Regulatory Areas must be made. Amendment 19 to the FMP, implemented as a measure to prevent roe stripping

  15. Proper pond management practices should always start with an assessment and inspection of the

    E-Print Network [OSTI]

    Boyer, Elizabeth W.

    1 Proper pond management practices should always start with an assessment and inspection that collects surface runoff from the surrounding land. College of Agricultural Sciences · Cooperative Extension source, it is a good idea to establish a buffer strip of vegetation around the pond to trap sediment

  16. QUANTITATIVE MICROBIAL RISK ASSESSMENT OF ORGANIC WASTE MANAGEMENT PRACTICES IN A PERI-URBAN COMMUNITY

    E-Print Network [OSTI]

    Richner, Heinz

    i QUANTITATIVE MICROBIAL RISK ASSESSMENT OF ORGANIC WASTE MANAGEMENT PRACTICES IN A PERI transfer station and the households who helped me in getting food waste samples. It should thing in my life with this little effort. #12;iii Abstract The growth of municipal solid waste

  17. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  18. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  19. Control of Major-Accident Hazards Involving Land Transmission Charlotte BOUISSOU, Project Manager for Pipelines Risk Assessment

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    aims to help authorities to balance the requirement of the new pipeline regulation with regardsControl of Major-Accident Hazards Involving Land Transmission Pipelines Charlotte BOUISSOU, Project Manager for Pipelines Risk Assessment Sandrine DESCOURRIERE, Project Manager for Plants Risk Assessment

  20. Risk management & organizational uncertainty implications for the assessment of high consequence organizations

    SciTech Connect (OSTI)

    Bennett, C.T.

    1995-02-23T23:59:59.000Z

    Post hoc analyses have demonstrated clearly that macro-system, organizational processes have played important roles in such major catastrophes as Three Mile Island, Bhopal, Exxon Valdez, Chernobyl, and Piper Alpha. How can managers of such high-consequence organizations as nuclear power plants and nuclear explosives handling facilities be sure that similar macro-system processes are not operating in their plants? To date, macro-system effects have not been integrated into risk assessments. Part of the reason for not using macro-system analyses to assess risk may be the impression that standard organizational measurement tools do not provide hard data that can be managed effectively. In this paper, I argue that organizational dimensions, like those in ISO 9000, can be quantified and integrated into standard risk assessments.

  1. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Consequences and Impacts It's important to recognize that adopting these advanced grid-control technologies doesn't just have the potential to increase power grid reliability...

  2. Comments on: Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced. C o

  3. Sandia Energy - Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatings Initiated at PNNL's SequimReactors To ReceiveCyber

  4. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatingsUltra-High-Voltage SiliconEnergyFailureGlobal Climate ModelsGrid

  5. Scientific basis for risk assessment and management of uranium mill tailings

    SciTech Connect (OSTI)

    Not Available

    1986-01-01T23:59:59.000Z

    A National Research Council study panel, convened by the Board on Radioactive Waste Management, has examined the scientific basis for risk assessment and management of uranium mill tailings and issued this final report containing a number of recommendations. Chapter 1 provides a brief introduction to the problem. Chapter 2 examines the processes of uranium extraction and the mechanisms by which radionuclides and toxic chemicals contained in the ore can enter the environment. Chapter 3 is devoted to a review of the evidence on health risks associated with radon and its decay products. Chapter 4 provides a consideration of conventional and possible new technical alternatives for tailings management. Chapter 5 explores a number of issues of comparative risk, provides a brief history of uranium mill tailings regulation, and concludes with a discussion of choices that must be made in mill tailing risk management. 211 refs., 30 figs., 27 tabs.

  6. Drought affects virtually all regions of the world and results in significant economic, social, and environmental impacts. The Federal Emergency Management Agency estimates

    E-Print Network [OSTI]

    Goddard, Steve

    geospatial decision-support tools to address agricultural drought hazards and identify regions of vulnerability in the management of drought risk. The goal of the National Agricultural Decision Support System assess- ment and exposure analysis. Drought risk management involves both expanding our ability

  7. Vulnerability, Risk Management, and Agricultural Development

    E-Print Network [OSTI]

    Fafchamps, Marcel

    2009-01-01T23:59:59.000Z

    P. (1980). “Attitudes Towards Risk: Experimental MeasurementIncentive Flexibility, and Risk. ” Americal Journal ofCaria, A. S. (2009), Risk Attitudes and The Formation of

  8. Environmental Management Assessment of the Continuous Electron Beam Accelerator Facility (CEBAF)

    SciTech Connect (OSTI)

    Not Available

    1993-03-01T23:59:59.000Z

    This report documents the results of the Environmental Management Assessment performed at the Continuous Electron Beam Accelerator Facility (CEBAF) in Newport News, Virginia. During this assessment, activities and records were reviewed and interviews were conducted with personnel from the CEBAF Site Office; the CEBAF management and operating contractor (M&O), Southeastern Universities Research Association, Inc. (SURA); the Oak Ridge Field Office (OR); and the responsible DOE Headquarters Program Office, the Office of Energy Research (ER). The onsite portion of the assessment was conducted from March 8 through March 19, 1993, by the US Department of Energy`s (DOE`s) Office of Environmental Audit (EH-24) located within the office of Environment, Safety and Health (EH). DOE 5482.1 B, ``Environment, Safety and Health Appraisal Program,`` and Secretary of Energy Notice (SEN)-6E-92, ``Departmental Organizational and Management Arrangements,`` establish the mission of EH-24 to provide comprehensive, independent oversight of Department-wide environmental programs on behalf of the Secretary of Energy. The ultimate goal of EH-24 is enhancement of environmental protection and minimization of risk to public health and the environment. EH-24 accomplishes its mission utilizing systematic and periodic evaluations of the Department`s environmental programs within line organizations, and through use of supplemental activities which serve to strengthen self-assessment and oversight functions within program, field, and contractor organizations.

  9. LCA-IWM: A decision support tool for sustainability assessment of waste management systems

    SciTech Connect (OSTI)

    Boer, J. den [Institute of Water Supply and Groundwater Protection, Wastewater Technology, Waste Management, Industrial Material Cycles, Environmental and Spatial Planning (Institute WAR), Technische Universitaet Darmstadt, Petersenstr. 13, 64287 Darmstadt (Germany)], E-mail: j.denboer@iwar.tu-darmstadt.de; Boer, E. den; Jager, J. [Institute of Water Supply and Groundwater Protection, Wastewater Technology, Waste Management, Industrial Material Cycles, Environmental and Spatial Planning (Institute WAR), Technische Universitaet Darmstadt, Petersenstr. 13, 64287 Darmstadt (Germany)

    2007-07-01T23:59:59.000Z

    The paper outlines the most significant result of the project 'The use of life cycle assessment tools for the development of integrated waste management strategies for cities and regions with rapid growing economies', which was the development of two decision-support tools: a municipal waste prognostic tool and a waste management system assessment tool. The article focuses on the assessment tool, which supports the adequate decision making in the planning of urban waste management systems by allowing the creation and comparison of different scenarios, considering three basic subsystems: (i) temporary storage; (ii) collection and transport and (iii) treatment, disposal and recycling. The design and analysis options, as well as the assumptions made for each subsystem, are shortly introduced, providing an overview of the applied methodologies and technologies. The sustainability assessment methodology used in the project to support the selection of the most adequate scenario is presented with a brief explanation of the procedures, criteria and indicators applied on the evaluation of each of the three sustainability pillars.

  10. Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California

    E-Print Network [OSTI]

    the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

  11. Assessment of External Hazards at Radioactive Waste and Used Fuel Management Facilities - 13505

    SciTech Connect (OSTI)

    Gerchikov, Mark; Schneider, Glenn; Khan, Badi; Alderson, Elizabeth [AMEC NSS, 393 University Ave., Toronto, ON (Canada)] [AMEC NSS, 393 University Ave., Toronto, ON (Canada)

    2013-07-01T23:59:59.000Z

    One of the key lessons from the Fukushima accident is the importance of having a comprehensive identification and evaluation of risks posed by external events to nuclear facilities. While the primary focus has been on nuclear power plants, the Canadian nuclear industry has also been updating hazard assessments for radioactive waste and used fuel management facilities to ensure that lessons learnt from Fukushima are addressed. External events are events that originate either physically outside the nuclear site or outside its control. They include natural events, such as high winds, lightning, earthquakes or flood due to extreme rainfall. The approaches that have been applied to the identification and assessment of external hazards in Canada are presented and analyzed. Specific aspects and considerations concerning hazards posed to radioactive waste and used fuel management operations are identified. Relevant hazard identification techniques are described, which draw upon available regulatory guidance and standard assessment techniques such as Hazard and Operability Studies (HAZOPs) and 'What-if' analysis. Consideration is given to ensuring that hazard combinations (for example: high winds and flooding due to rainfall) are properly taken into account. Approaches that can be used to screen out external hazards, through a combination of frequency and impact assessments, are summarized. For those hazards that cannot be screened out, a brief overview of methods that can be used to conduct more detailed hazard assessments is also provided. The lessons learnt from the Fukushima accident have had a significant impact on specific aspects of the approaches used to hazard assessment for waste management. Practical examples of the effect of these impacts are provided. (authors)

  12. Use of probabilistic risk assessment (PRA) in expert systems to advise nuclear plant operators and managers

    SciTech Connect (OSTI)

    Uhrig, R.E.

    1988-01-01T23:59:59.000Z

    The use of expert systems in nuclear power plants to provide advice to managers, supervisors and/or operators is a concept that is rapidly gaining acceptance. Generally, expert systems rely on the expertise of human experts or knowledge that has been modified in publications, books, or regulations to provide advice under a wide variety of conditions. In this work, a probabilistic risk assessment (PRA)/sup 3/ of a nuclear power plant performed previously is used to assess the safety status of nuclear power plants and to make recommendations to the plant personnel. 5 refs., 1 fig., 2 tabs.

  13. UEA Water Security Research Centre Climate Change and Variability Adaptation and Vulnerability

    E-Print Network [OSTI]

    Everest, Graham R

    UEA Water Security Research Centre Climate Change and Variability · Adaptation and Vulnerability · Transboundary Cooperation ­ Conflict · Irrigation Performance and Policy · River Basin Management · Water Allocation · Hydropolitics www.uea.ac.uk/watersecurity #12;The UEA Water Security Research Centre applies

  14. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01T23:59:59.000Z

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  15. Arctic sea ice trends and narwhal vulnerability Kristin L. Laidre a,*, Mads Peter Heide-Jrgensen b

    E-Print Network [OSTI]

    Laidre, Kristin L.

    risk assess- ments as this may exceed the natural response capacity of the species. Ó 2004 Elsevier Ltd; Risk assessment; Vulnerability 1. Introduction Significant physical and biological shifts have recently climate change require that species vulnerability be incorporated into population risk models, especially

  16. Developing a GIS tool to assess potential damage of future floods J. Eleutrio1,2

    E-Print Network [OSTI]

    Boyer, Edmond

    analysis, vulnerability assessment, natural hazard, decision support tool. 1 Introduction Flood risk brings and A. Rozan1 1 UMR Cemagref/ENGEES GESTE, Territorial Management of Water and Environment, France 2 UTR Urban Hydraulics - UMR CNRS/UdS/ ENGEES Mechanical Institute of Fluids and Solids, France Abstract

  17. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 2

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A. [and others] [and others

    1995-06-30T23:59:59.000Z

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation.

  18. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 1

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A. [and others] [and others

    1995-06-30T23:59:59.000Z

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation. These Appendices contain the Federal Register Notice, comments on evaluation factors, independent technical reviewers resumes, independent technical reviewers manual, and technology information packages.

  19. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  20. Life cycle assessment of solid waste management options for Eskisehir, Turkey

    SciTech Connect (OSTI)

    Banar, Mufide [Anadolu University, Faculty of Engineering and Architecture, Department of Environmental Engineering, Iki Eylul Campus, 26555 Eskisehir (Turkey)], E-mail: mbanar@anadolu.edu.tr; Cokaygil, Zerrin; Ozkan, Aysun [Anadolu University, Faculty of Engineering and Architecture, Department of Environmental Engineering, Iki Eylul Campus, 26555 Eskisehir (Turkey)

    2009-01-15T23:59:59.000Z

    Life cycle assessment (LCA) methodology was used to determine the optimum municipal solid waste (MSW) management strategy for Eskisehir city. Eskisehir is one of the developing cities of Turkey where a total of approximately 750 tons/day of waste is generated. An effective MSW management system is needed in this city since the generated MSW is dumped in an unregulated dumping site that has no liner, no biogas capture, etc. Therefore, five different scenarios were developed as alternatives to the current waste management system. Collection and transportation of waste, a material recovery facility (MRF), recycling, composting, incineration and landfilling processes were considered in these scenarios. SimaPro7 libraries were used to obtain background data for the life cycle inventory. One ton of municipal solid waste of Eskisehir was selected as the functional unit. The alternative scenarios were compared through the CML 2000 method and these comparisons were carried out from the abiotic depletion, global warming, human toxicity, acidification, eutrophication and photochemical ozone depletion points of view. According to the comparisons and sensitivity analysis, composting scenario, S3, is the more environmentally preferable alternative. In this study waste management alternatives were investigated only on an environmental point of view. For that reason, it might be supported with other decision-making tools that consider the economic and social effects of solid waste management.

  1. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  2. Integrated farm sustainability assessment for the environmental management of rural activities

    SciTech Connect (OSTI)

    Stachetii Rodrigues, Geraldo, E-mail: stacheti@cnpma.embrapa.b [Embrapa Labex Europe, Agropolis International, Avenue Agropolis, 34394, Montpellier (France); Aparecida Rodrigues, Izilda, E-mail: isis@cnpma.embrapa.b [Environmental Management Laboratory, Embrapa Environment, Rodovia SP340, km 127.5, Jaguariuna (SP), CEP 13820-000 (Brazil); Almeida Buschinelli, Claudio Cesar de, E-mail: buschi@cnpma.embrapa.b [Environmental Management Laboratory, Embrapa Environment, Rodovia SP340, km 127.5, Jaguariuna (SP), CEP 13820-000 (Brazil); Barros, Inacio de, E-mail: indebarros@antilles.inra.f [INRA, Unite de Recherche Agropedoclimatique da la Zone Caraibe, Domaine Duclos, 97170 Petit-Bourg (France)

    2010-07-15T23:59:59.000Z

    Farmers have been increasingly called upon to respond to an ongoing redefinition in consumers' demands, having as a converging theme the search for sustainable production practices. In order to satisfy this objective, instruments for the environmental management of agricultural activities have been sought out. Environmental impact assessment methods are appropriate tools to address the choice of technologies and management practices to minimize negative effects of agricultural development, while maximizing productive efficiency, sound usage of natural resources, conservation of ecological assets and equitable access to wealth generation means. The 'system for weighted environmental impact assessment of rural activities' (APOIA-NovoRural) presented in this paper is organized to provide integrated farm sustainability assessment according to quantitative environmental standards and defined socio-economic benchmarks. The system integrates sixty-two objective indicators in five sustainability dimensions - (i) Landscape ecology, (ii) Environmental quality (atmosphere, water and soil), (iii) Sociocultural values, (iv) Economic values, and (v) Management and administration. Impact indices are expressed in three integration levels: (i) specific indicators, that offer a diagnostic and managerial tool for farmers and rural administrators, by pointing out particular attributes of the rural activities that may be failing to comply with defined environmental performance objectives; (ii) integrated sustainability dimensions, that show decision-makers the major contributions of the rural activities toward local sustainable development, facilitating the definition of control actions and promotion measures; and (iii) aggregated sustainability index, that can be considered a yardstick for eco-certification purposes. Nine fully documented case studies carried out with the APOIA-NovoRural system, focusing on different scales, diverse rural activities/farming systems, and contrasting spatial/territorial contexts, attest to the malleability of the method and its applicability as an integrated farm environmental management tool.

  3. Result Summary for the Area 5 Radioactive Waste Management Site Performance Assessment Model Version 4.113

    SciTech Connect (OSTI)

    Shott, G. J.

    2012-04-15T23:59:59.000Z

    Preliminary results for Version 4.113 of the Nevada National Security Site Area 5 Radioactive Waste Management Site performance assessment model are summarized. Version 4.113 includes the Fiscal Year 2011 inventory estimate.

  4. The Dempster-Schafer Theory of Belief Functions for Managing Uncertainties: An Introduction and Fraud Risk Assessment Illustration

    E-Print Network [OSTI]

    Srivastava, Rajendra P.; Mock, Theodore J.; Gao, Lei

    2011-01-01T23:59:59.000Z

    fraud risk assessment formula for a simplified version of a model developed by Srivastava, Mock, and Turner (2007). In our formulation, fraud risk is the normalized product of four risks: risk that management has incentives to commit fraud, risk...

  5. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  6. Environmental assessment of garden waste management in the Municipality of Aarhus, Denmark

    SciTech Connect (OSTI)

    Boldrin, Alessio, E-mail: aleb@env.dtu.dk [Department of Environmental Engineering, Technical University of Denmark, Kongens Lyngby (Denmark); Andersen, Jacob K.; Christensen, Thomas H. [Department of Environmental Engineering, Technical University of Denmark, Kongens Lyngby (Denmark)

    2011-07-15T23:59:59.000Z

    An environmental assessment of six scenarios for handling of garden waste in the Municipality of Aarhus (Denmark) was performed from a life cycle perspective by means of the LCA-model EASEWASTE. In the first (baseline) scenario, the current garden waste management system based on windrow composting was assessed, while in the other five scenarios alternative solutions including incineration and home composting of fractions of the garden waste were evaluated. The environmental profile (normalised to Person Equivalent, PE) of the current garden waste management in Aarhus is in the order of -6 to 8 mPE Mg{sup -1} ww for the non-toxic categories and up to 100 mPE Mg{sup -1} ww for the toxic categories. The potential impacts on non-toxic categories are much smaller than what is found for other fractions of municipal solid waste. Incineration (up to 35% of the garden waste) and home composting (up to 18% of the garden waste) seem from an environmental point of view suitable for diverting waste away from the composting facility in order to increase its capacity. In particular the incineration of woody parts of the garden waste improved the environmental profile of the garden waste management significantly.

  7. Power Grid Vulnerability to Geographically Correlated Failures

    E-Print Network [OSTI]

    Shepard, Kenneth

    Power Grid Vulnerability to Geographically Correlated Failures ­ Analysis and Control Implications such as telecommunications networks [14]. The power grid is vulnerable to natural disasters, such as earthquakes, hurricanes [17], [34]. Thus, we focus on the vulnerability of the power grid to an outage of several lines

  8. Management of spent nuclear fuel on the Oak Ridge Reservation, Oak Ridge, Tennessee: Environmental assessment

    SciTech Connect (OSTI)

    NONE

    1996-02-01T23:59:59.000Z

    On June 1, 1995, DOE issued a Record of Decision [60 Federal Register 28680] for the Department-wide management of spent nuclear fuel (SNF); regionalized storage of SNF by fuel type was selected as the preferred alternative. The proposed action evaluated in this environmental assessment is the management of SNF on the Oak Ridge Reservation (ORR) to implement this preferred alternative of regional storage. SNF would be retrieved from storage, transferred to a hot cell if segregation by fuel type and/or repackaging is required, loaded into casks, and shipped to off-site storage. The proposed action would also include construction and operation of a dry cask SNF storage facility on ORR, in case of inadequate SNF storage. Action is needed to enable DOE to continue operation of the High Flux Isotope Reactor, which generates SNF. This report addresses environmental impacts.

  9. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14T23:59:59.000Z

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  10. Applications of life cycle assessment and cost analysis in health care waste management

    SciTech Connect (OSTI)

    Soares, Sebastiao Roberto, E-mail: soares@ens.ufsc.br [Department of Sanitary Engineering, Federal University of Santa Catarina, UFSC, Campus Universitario, Centro Tecnologico, Trindade, PO Box 476, Florianopolis, SC 88040-970 (Brazil); Finotti, Alexandra Rodrigues, E-mail: finotti@ens.ufsc.br [Department of Sanitary Engineering, Federal University of Santa Catarina, UFSC, Campus Universitario, Centro Tecnologico, Trindade, PO Box 476, Florianopolis, SC 88040-970 (Brazil); Prudencio da Silva, Vamilson, E-mail: vamilson@epagri.sc.gov.br [Department of Sanitary Engineering, Federal University of Santa Catarina, UFSC, Campus Universitario, Centro Tecnologico, Trindade, PO Box 476, Florianopolis, SC 88040-970 (Brazil); EPAGRI, Rod. Admar Gonzaga 1347, Itacorubi, Florianopolis, Santa Catarina 88034-901 (Brazil); Alvarenga, Rodrigo A.F., E-mail: alvarenga.raf@gmail.com [Department of Sanitary Engineering, Federal University of Santa Catarina, UFSC, Campus Universitario, Centro Tecnologico, Trindade, PO Box 476, Florianopolis, SC 88040-970 (Brazil); Ghent University, Department of Sustainable Organic Chemistry and Technology, Coupure Links 653/9000 Gent (Belgium)

    2013-01-15T23:59:59.000Z

    Highlights: Black-Right-Pointing-Pointer Three Health Care Waste (HCW) scenarios were assessed through environmental and cost analysis. Black-Right-Pointing-Pointer HCW treatment using microwave oven had the lowest environmental impacts and costs in comparison with autoclave and lime. Black-Right-Pointing-Pointer Lime had the worst environmental and economic results for HCW treatment, in comparison with autoclave and microwave. - Abstract: The establishment of rules to manage Health Care Waste (HCW) is a challenge for the public sector. Regulatory agencies must ensure the safety of waste management alternatives for two very different profiles of generators: (1) hospitals, which concentrate the production of HCW and (2) small establishments, such as clinics, pharmacies and other sources, that generate dispersed quantities of HCW and are scattered throughout the city. To assist in developing sector regulations for the small generators, we evaluated three management scenarios using decision-making tools. They consisted of a disinfection technique (microwave, autoclave and lime) followed by landfilling, where transportation was also included. The microwave, autoclave and lime techniques were tested at the laboratory to establish the operating parameters to ensure their efficiency in disinfection. Using a life cycle assessment (LCA) and cost analysis, the decision-making tools aimed to determine the technique with the best environmental performance. This consisted of evaluating the eco-efficiency of each scenario. Based on the life cycle assessment, microwaving had the lowest environmental impact (12.64 Pt) followed by autoclaving (48.46 Pt). The cost analyses indicated values of US$ 0.12 kg{sup -1} for the waste treated with microwaves, US$ 1.10 kg{sup -1} for the waste treated by the autoclave and US$ 1.53 kg{sup -1} for the waste treated with lime. The microwave disinfection presented the best eco-efficiency performance among those studied and provided a feasible alternative to subsidize the formulation of the policy for small generators of HCW.

  11. Joint Assessment of Renewable Energy and Water Desalination Research Center (REWDC) Program Capabilities and Facilities In Radioactive Waste Management

    SciTech Connect (OSTI)

    Bissani, M; Fischer, R; Kidd, S; Merrigan, J

    2006-04-03T23:59:59.000Z

    The primary goal of this visit was to perform a joint assessment of the Renewable Energy and Water Desalination Center's (REWDC) program in radioactive waste management. The visit represented the fourth technical and scientific interaction with Libya under the DOE/NNSA Sister Laboratory Arrangement. Specific topics addressed during the visit focused on Action Sheet P-05-5, ''Radioactive Waste Management''. The Team, comprised of Mo Bissani (Team Lead), Robert Fischer, Scott Kidd, and Jim Merrigan, consulted with REWDC management and staff. The team collected information, discussed particulars of the technical collaboration and toured the Tajura facility. The tour included the waste treatment facility, waste storage/disposal facility, research reactor facility, hot cells and analytical labs. The assessment team conducted the first phase of Task A for Action Sheet 5, which involved a joint assessment of the Radioactive Waste Management Program. The assessment included review of the facilities dedicated to the management of radioactive waste at the Tourja site, the waste management practices, proposed projects for the facility and potential impacts on waste generation and management.

  12. An assessment of potential for benefit from integrating geographic information systems technology into life-cycle management of infrastructures a focus for infrastructure management practice

    E-Print Network [OSTI]

    Millegan, Harold Lynn

    1997-01-01T23:59:59.000Z

    : Dr. Robert L. Lytton Infrastructure life-cycle management phases with the greatest potential for benefit from Geographic Information Systems (GIS), is the subject of this thesis. The planning, design, construction, operations, maintenance... then focuses on analysis of data collected by a questionnaire sent to in&astructure managers in Texas. The survey was made to assess how important and frequently they deal with issues associated with the planning, design, construction, operation, maintenance...

  13. Assessment of national systems for obtaining local acceptance of waste management siting and routing activities

    SciTech Connect (OSTI)

    Paige, H.W.; Lipman, D.S.; Owens, J.E.

    1980-07-01T23:59:59.000Z

    There is a rich mixture of formal and informal approaches being used in our sister nuclear democracies in their attempts to deal with the difficulties of obtaining local acceptance for siting of waste management facilities and activities. Some of these are meeting with a degree of success not yet achieved in the US. Although this survey documents and assesses many of these approaches, time did not permit addressing in any detail their relevance to common problems in the US. It would appear the US could benefit from a periodic review of the successes and failures of these efforts, including analysis of their applicability to the US system. Of those countries (Germany, Sweden, Switzerland, Japan, Belgium, and the US) who are working to a time table for the preparation of a high-level waste (HLW) repository, Germany is the only country to have gained local siting acceptance for theirs. With this (the most difficult of siting problems) behind them they appear to be in the best overall condition relative to waste management progress and plans. This has been achieved without a particularly favorable political structure, made up for by determination on the part of the political leadership. Of the remaining three countries studied (France, UK and Canada) France, with its AVM production facility, is clearly the world leader in the HLW immobilization aspect of waste management. France, Belgium and the UK appear to have the least favorable political structures and environments for arriving at waste management decisions. US, Switzerland and Canada appear to have the least favorable political structures and environments for arriving at waste management decisions.

  14. MANAGEMENT OF RESEARCH AND TEST REACTOR ALUMINUM SPENT NUCLEAR FUEL - A TECHNOLOGY ASSESSMENT

    SciTech Connect (OSTI)

    Vinson, D.

    2010-07-11T23:59:59.000Z

    The Department of Energy's Environmental Management (DOE-EM) Program is responsible for the receipt and storage of aluminum research reactor spent nuclear fuel or used fuel until ultimate disposition. Aluminum research reactor used fuel is currently being stored or is anticipated to be returned to the U.S. and stored at DOE-EM storage facilities at the Savannah River Site and the Idaho Nuclear Technology and Engineering Center. This paper assesses the technologies and the options for safe transportation/receipt and interim storage of aluminum research reactor spent fuel and reviews the comprehensive strategy for its management. The U.S. Department of Energy uses the Appendix A, Spent Nuclear Fuel Acceptance Criteria, to identify the physical, chemical, and isotopic characteristics of spent nuclear fuel to be returned to the United States under the Foreign Research Reactor Spent Nuclear Fuel Acceptance Program. The fuel is further evaluated for acceptance through assessments of the fuel at the foreign sites that include corrosion damage and handleability. Transport involves use of commercial shipping casks with defined leakage rates that can provide containment of the fuel, some of which are breached. Options for safe storage include wet storage and dry storage. Both options must fully address potential degradation of the aluminum during the storage period. This paper focuses on the various options for safe transport and storage with respect to technology maturity and application.

  15. Comparative evaluation of life cycle assessment models for solid waste management

    SciTech Connect (OSTI)

    Winkler, Joerg [Institute for Waste Management and Contaminated Sites Treatment, TU Dresden Faculty of Forestry, Geo and Hydro Sciences, Pratzschwitzer Str. 15, 01796 Pirna (Germany); Bilitewski, Bernd [Institute for Waste Management and Contaminated Sites Treatment, TU Dresden Faculty of Forestry, Geo and Hydro Sciences, Pratzschwitzer Str. 15, 01796 Pirna (Germany)], E-mail: abfall@rcs.urz.tu-dresden.de

    2007-07-01T23:59:59.000Z

    This publication compares a selection of six different models developed in Europe and America by research organisations, industry associations and governmental institutions. The comparison of the models reveals the variations in the results and the differences in the conclusions of an LCA study done with these models. The models are compared by modelling a specific case - the waste management system of Dresden, Germany - with each model and an in-detail comparison of the life cycle inventory results. Moreover, a life cycle impact assessment shows if the LCA results of each model allows for comparable and consecutive conclusions, which do not contradict the conclusions derived from the other models' results. Furthermore, the influence of different level of detail in the life cycle inventory of the life cycle assessment is demonstrated. The model comparison revealed that the variations in the LCA results calculated by the models for the case show high variations and are not negligible. In some cases the high variations in results lead to contradictory conclusions concerning the environmental performance of the waste management processes. The static, linear modelling approach chosen by all models analysed is inappropriate for reflecting actual conditions. Moreover, it was found that although the models' approach to LCA is comparable on a general level, the level of detail implemented in the software tools is very different.

  16. Hawaii demand-side management resource assessment. Final report: DSM opportunity report

    SciTech Connect (OSTI)

    NONE

    1995-08-01T23:59:59.000Z

    The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. 10 figs., 55 tabs.

  17. Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems

    E-Print Network [OSTI]

    Hamedifar, Hamed

    2012-01-01T23:59:59.000Z

    Conditions in a Project." Risk Management: An Internationalan Approach to Risk Management. ” J. of Hazardous Materials,URS). (2009a). “Delta risk management strategy, Phase 1:

  18. Identification and assessment of containment and release management strategies for a BWR Mark I containment

    SciTech Connect (OSTI)

    Lin, C.C.; Lehner, J.R. (Brookhaven National Lab., Upton, NY (United States))

    1991-09-01T23:59:59.000Z

    This report identifies and assesses accident management strategies which could be important for preventing containment failure and/or mitigating the release of fission products during a severe accident in a BWR plant with a Mark 1 type of containment. Based on information available from probabilistic risk assessments and other existing severe accident research, and using simplified containment and release event trees, the report identifies the challenges a Mark 1 containment could face during the course of a severe accident, the mechanisms behind these challenges, and the strategies that could be used to mitigate the challenges. A safety objective tree is developed which provides the connection between the safety objectives, the safety functions, the challenges, and the strategies. The strategies were assessed by applying them to certain severe accident sequence categories which have one or more of the following characteristics: have high probability of core damage or high consequences, lead to a number of challenges, and involve the failure of multiple systems. 59 refs., 55 figs., 27 tabs.

  19. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01T23:59:59.000Z

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  20. Material and energy recovery in integrated waste management systems. An evaluation based on life cycle assessment

    SciTech Connect (OSTI)

    Giugliano, Michele; Cernuschi, Stefano [Politecnico di Milano - DIIAR, Environmental Section, P.zza Leonardo da Vinci, 32, 20133 Milano (Italy); Grosso, Mario, E-mail: mario.grosso@polimi.it [Politecnico di Milano - DIIAR, Environmental Section, P.zza Leonardo da Vinci, 32, 20133 Milano (Italy); Rigamonti, Lucia [Politecnico di Milano - DIIAR, Environmental Section, P.zza Leonardo da Vinci, 32, 20133 Milano (Italy)

    2011-09-15T23:59:59.000Z

    This paper reports the environmental results, integrated with those arising from mass and energy balances, of a research project on the comparative analysis of strategies for material and energy recovery from waste, funded by the Italian Ministry of Education, University and Research. The project, involving the cooperation of five University research groups, was devoted to the optimisation of material and energy recovery activities within integrated municipal solid waste (MSW) management systems. Four scenarios of separate collection (overall value of 35%, 50% without the collection of food waste, 50% including the collection of food waste, 65%) were defined for the implementation of energetic, environmental and economic balances. Two sizes of integrated MSW management system (IWMS) were considered: a metropolitan area, with a gross MSW production of 750,000 t/year and an average province, with a gross MSW production of 150,000 t/year. The environmental analysis was conducted using Life Cycle Assessment methodology (LCA), for both material and energy recovery activities. In order to avoid allocation we have used the technique of the expansion of the system boundaries. This means taking into consideration the impact on the environment related to the waste management activities in comparison with the avoided impacts related to the saving of raw materials and primary energy. Under the hypotheses of the study, both for the large and for the small IWMS, the energetic and environmental benefits are higher than the energetic and environmental impacts for all the scenarios analysed in terms of all the indicators considered: the scenario with 50% separate collection in a drop-off scheme excluding food waste shows the most promising perspectives, mainly arising from the highest collection (and recycling) of all the packaging materials, which is the activity giving the biggest energetic and environmental benefits. Main conclusions of the study in the general field of the assessment of the environmental performance of any integrated waste management scheme address the importance of properly defining, beyond the design value assumed for the separate collection as a whole, also the yields of each material recovered; particular significance is finally related to the amount of residues deriving from material recovery activities, resulting on average in the order of 20% of the collected materials.

  1. Management Challenges in Developing Performance Assessments and Effectively Communicating Their Results - 13612

    SciTech Connect (OSTI)

    Thomas, Steve; Mahoney, Mark [Savannah River Remediations LLC, Building 705-1C, Savannah River Site, Aiken, SC 29808 (United States)] [Savannah River Remediations LLC, Building 705-1C, Savannah River Site, Aiken, SC 29808 (United States)

    2013-07-01T23:59:59.000Z

    The end of the Cold War has left a legacy of approximately 37 million gallons of radioactive waste in the aging waste tanks at the Department of Energy's Savannah River Site (SRS). A robust program is in place to remove waste from these tanks, treat the waste to separate into a relatively small volume of high level waste and a large volume of low-level waste, and to actively dispose of the low-level waste on-site and close the cleaned waste tanks and associated ancillary structures. To support performance-based, risk-informed decision making, performance assessments have been developed for the low-level waste disposal facility and for the SRS Tank Farms. Although these performance assessments share many similar features, the nature of the hazards and associated containments differ. As a management team, we are challenged to effectively communicate both the similarities and differences of these performance assessments, how they should be used to support sound decision making for treatment, disposal and waste tank cleaning decisions, and in defending their respective assumptions to the regulatory community and the public but, equally important, to our own corporate decision makers and operations personnel. Effective development and defense of these performance assessments, and effective interpretation and communication of the results are key to making cost-effective, pragmatic decisions for the safe disposal of the low-level waste and stabilization and operational closure of the cleaned tanks and associated structures. This paper will focus on the importance and challenges in communicating key attributes, conclusions and operational implications within a company. (authors)

  2. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy...

  3. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01T23:59:59.000Z

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  4. Radioactive Waste Management Complex low-level waste radiological performance assessment

    SciTech Connect (OSTI)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01T23:59:59.000Z

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  5. Improvement actions in waste management systems at the provincial scale based on a life cycle assessment evaluation

    SciTech Connect (OSTI)

    Rigamonti, L., E-mail: lucia.rigamonti@polimi.it; Falbo, A.; Grosso, M.

    2013-11-15T23:59:59.000Z

    Highlights: • LCA was used for evaluating the performance of four provincial waste management systems. • Milano, Bergamo, Pavia and Mantova (Italy) are the provinces selected for the analysis. • Most of the data used to model the systems are primary. • Significant differences were found among the provinces located in the same Region. • LCA was used as a decision-supporting tool by Regione Lombardia. - Abstract: This paper reports some of the findings of the ‘GERLA’ project: GEstione Rifiuti in Lombardia – Analisi del ciclo di vita (Waste management in Lombardia – Life cycle assessment). The project was devoted to support Lombardia Region in the drafting of the new waste management plan by applying a life cycle thinking perspective. The present paper mainly focuses on four Provinces in the Region, which were selected based on their peculiarities. Life cycle assessment (LCA) was adopted as the methodology to assess the current performance of the integrated waste management systems, to discuss strengths and weaknesses of each of them and to design their perspective evolution as of year 2020. Results show that despite a usual business approach that is beneficial to all the provinces, the introduction of technological and management improvements to the system provides in general additional energy and environmental benefits for all four provinces. The same improvements can be easily extended to the whole Region, leading to increased environmental benefits from the waste management sector, in line with the targets set by the European Union for 2020.

  6. One size fits all? An assessment tool for solid waste management at local and national levels

    SciTech Connect (OSTI)

    Broitman, Dani, E-mail: danib@techunix.technion.ac.il [Department of Natural Resources and Environment Management, Graduate school of Management, University of Haifa, Haifa 31905 (Israel); Ayalon, Ofira [Department of Natural Resources and Environment Management, Graduate school of Management, University of Haifa, Haifa 31905 (Israel); Kan, Iddo [Department of Agricultural Economics and Management, Faculty of Agricultural, Food and Environmental Quality Sciences, Rehovot 76100 (Israel)

    2012-10-15T23:59:59.000Z

    Highlights: Black-Right-Pointing-Pointer Waste management schemes are generally implemented at national or regional level. Black-Right-Pointing-Pointer Local conditions characteristics and constraints are often neglected. Black-Right-Pointing-Pointer We developed an economic model able to compare multi-level waste management options. Black-Right-Pointing-Pointer A detailed test case with real economic data and a best-fit scenario is described. Black-Right-Pointing-Pointer Most efficient schemes combine clear National directives with local level flexibility. - Abstract: As environmental awareness rises, integrated solid waste management (WM) schemes are increasingly being implemented all over the world. The different WM schemes usually address issues such as landfilling restrictions (mainly due to methane emissions and competing land use), packaging directives and compulsory recycling goals. These schemes are, in general, designed at a national or regional level, whereas local conditions and constraints are sometimes neglected. When national WM top-down policies, in addition to setting goals, also dictate the methods by which they are to be achieved, local authorities lose their freedom to optimize their operational WM schemes according to their specific characteristics. There are a myriad of implementation options at the local level, and by carrying out a bottom-up approach the overall national WM system will be optimal on economic and environmental scales. This paper presents a model for optimizing waste strategies at a local level and evaluates this effect at a national level. This is achieved by using a waste assessment model which enables us to compare both the economic viability of several WM options at the local (single municipal authority) level, and aggregated results for regional or national levels. A test case based on various WM approaches in Israel (several implementations of mixed and separated waste) shows that local characteristics significantly influence WM costs, and therefore the optimal scheme is one under which each local authority is able to implement its best-fitting mechanism, given that national guidelines are kept. The main result is that strict national/regional WM policies may be less efficient, unless some type of local flexibility is implemented. Our model is designed both for top-down and bottom-up assessment, and can be easily adapted for a wide range of WM option comparisons at different levels.

  7. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  8. Detecting Network Vulnerabilities Through Graph Theoretical Methods

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

  9. Control Model Integrated Management and Assessment System. These materials are from April 2000 and pertain to Savanna

    E-Print Network [OSTI]

    Boone, Randall B.

    Control Model #12;134 Integrated Management and Assessment System. These materials are from AprilView for contacts. Total biomass, by plant groups As you have already likely noticed, the control model includes and dead biomass, for a typical April to July NCA-Savanna Control Model #12;135 Root biomass for herbaceous

  10. Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site

    SciTech Connect (OSTI)

    NSTec Radioactive Waste

    2010-10-12T23:59:59.000Z

    Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products.

  11. Range Con: a management evaluation system for assessing sucess of selected range improvement practices

    E-Print Network [OSTI]

    Ekblad, Steven Linn

    1989-01-01T23:59:59.000Z

    strategic resource management plans. Individual management skills and managerial environment have not been considered when predicting biological and economic response of range management practices. Risk for individual managers adopting unsuited... APPENDIX Prototype Range Management Skills Survey. Range Management Skills Survey Survey Data Tables. Validation Figures. VITA 64 65 74 92 104 106 1X LIST OP FIGURES FIGURE Page 1. The Range Con expert system in relation to the Resource...

  12. Evaluating self-reported pressure ulcer prevention measures in persons with1 spinal cord injury using the revised Skin Management Needs Assessment2

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    using the revised Skin Management Needs Assessment2 Checklist : reliability study3 Gélis Anthony, MD 1, Centre Hospitalier Universitaire de20 Bordeaux, France21 22 Corresponding author:23 Dr. Anthony GELIS, M: to translate, evaluate the reliability and cross-culturally adapt the Skin2 Management Needs Assessment

  13. Rangeland Ecol Manage 66:364375 | May 2013 | DOI: 10.2111/REM-D-11-00130.1 Assessing Impacts of Roads: Application of a Standard Assessment Protocol

    E-Print Network [OSTI]

    management, assessment, monitoring, off-highway vehicles, oil and gas, rangeland health INTRODUCTION Adaptive managers are left with little more than observations and perceptions to support management decisions processes but stratification based on apparent impact did not. Analysis of the repeatability of IIRH applied

  14. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Energy Savers [EERE]

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  15. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Energy Savers [EERE]

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  16. aquifer contamination vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

  17. V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

  18. Surficial geology and performance assessment for a Radioactive Waste Management Facility at the Nevada Test Site

    SciTech Connect (OSTI)

    Snyder, K.E. [Lockheed Environmental Systems and Technologies, Co., Las Vegas, NV (United States); Gustafson, D.L.; Huckins-Gang, H.E.; Miller, J.J.; Rawlinson, S.E. [Raytheon Services Nevada, Las Vegas, NV (United States)

    1995-02-01T23:59:59.000Z

    At the Nevada Test Site, one potentially disruptive scenario being evaluated for the Greater Confinement Disposal (GCD) Facility Performance Assessment is deep post-closure erosion that would expose buried radioactive waste to the accessible environment. The GCD Facility located at the Area 5 Radioactive Waste Management Site (RWMS) lies at the juncture of three alluvial fan systems. Geomorphic surface mapping in northern Frenchman Flat indicates that reaches of these fans where the RWMS is now located have been constructional since at least the middle Quaternary. Mapping indicates a regular sequence of prograding fans with entrenchment of the older fan surfaces near the mountain fronts and construction of progressively younger inset fans farther from the mountain fronts. At the facility, the oldest fan surfaces are of late Pleistocene and Holocene age. More recent geomorphic activity has been limited to erosion and deposition along small channels. Trench and pit wall mapping found maximum incision in the vicinity of the RWMS to be less than 1.5 m. Based on collected data, natural geomorphic processes are unlikely to result in erosion to a depth of more than approximately 2 m at the facility within the 10,000-year regulatory period.

  19. Pilot study risk assessment for selected problems at the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Hamilton, L.D.; Meinhold, A.F.; Baxter, S.L.; Holtzman, S.; Morris, S.C.; Pardi, R.; Rowe, M.D.; Sun, C. [Brookhaven National Lab., Upton, NY (United States); Anspaugh, L.; Layton, D. [Lawrence Livermore National Lab., CA (United States)

    1993-03-01T23:59:59.000Z

    Two important environmental problems at the USDOE Fernald Environmental Management Project (FEMP) facility in Fernald, Ohio were studied in this human health risk assessment. The problems studied were radon emissions from the K-65 waste silos, and offsite contamination of ground water with uranium. Waste from the processing of pitchblende ore is stored in the K-65 silos at the FEMP. Radium-226 in the waste decays to radon gas which escapes to the outside atmosphere. The concern is for an increase in lung cancer risk for nearby residents associated with radon exposure. Monitoring data and a gaussian plume transport model were used to develop a source term and predict exposure and risk to fenceline residents, residents within 1 and 5 miles of the silos, and residents of Hamilton and Cincinnati, Ohio. Two release scenarios were studied: the routine release of radon from the silos and an accidental loss of one silo dome integrity. Exposure parameters and risk factors were described as distributions. Risks associated with natural background radon concentrations were also estimated.

  20. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions as the major theme. #12;Interdisciplinary Impact of Networks Networks Energy Manufacturing Telecommunications

  1. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  2. Cancer Vulnerabilities Unveiled by Genomic Loss

    E-Print Network [OSTI]

    Nijhawan, Deepak

    Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

  3. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Broader source: Energy.gov (indexed) [DOE]

    Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...

  4. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect (OSTI)

    Abercrombie, R. K. [ORNL] [ORNL; Peters, Scott [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2014-05-28T23:59:59.000Z

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  5. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  6. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  7. RCRA Assessment Plan for Single-Shell Tank Waste Management Area S-SX at the Hanford Site

    SciTech Connect (OSTI)

    Chou, C.J.; Johnson, V.G.

    1999-10-06T23:59:59.000Z

    A groundwater quality assessment plan was prepared for waste management area S-SX at the Hanford Site. Groundwater monitoring is conducted at this facility in accordance with Title 40, Code of Federal Regulation (CFR) Part 265, Subpart F [and by reference of Washington Administrative Code (WAC) 173-303-400(3)]. The facility was placed in assessment groundwater monitoring program status after elevated waste constituents and indicator parameter measurements (i.e., chromium, technetium-99 and specific conductance) in downgradient monitoring wells were observed and confirmed. A first determination, as allowed under 40 CFR 265.93(d), provides the owner/operator of a facility an opportunity to demonstrate that the regulated unit is not the source of groundwater contamination. Based on results of the first determination it was concluded that multiple source locations in the waste management area could account for observed spatial and temporal groundwater contamination patterns. Consequently, a continued investigation is required. This plan, developed using the data quality objectives process, is intended to comply with the continued investigation requirement. Accordingly, the primary purpose of the present plan is to determine the rate and extent of dangerous waste (hexavalent chromium and nitrate) and radioactive constituents (e.g., technetium-99) in groundwater and to determine their concentrations in groundwater beneath waste management area S-SX. Comments and concerns expressed by the Washington State Department of Ecology on the initial waste management area S-SX assessment report were addressed in the descriptive narrative of this plan as well as in the planned activities. Comment disposition is documented in a separate addendum to this plan.

  8. Aeronautical System Center's environmental compliance assessment and management program's cost-saving initiatives support the Air Force's acquisition reform initiative

    SciTech Connect (OSTI)

    Meanor, T.

    1999-07-01T23:59:59.000Z

    The Environmental Management directorate of ASC (ASC/EM) has the responsibility of providing government oversight for the Government Owned Contractor Operated Aircraft and Missile plants (GOCOs). This oversight is manifested as a landlord role where Air Force provides the funding required to maintain the plant facilities including buildings and utilities as well as environmental systems. By agreement the companies operating the plants are required to operate them in accordance with environmental law. Presently the GOCOs include Air Force Plant (AFP) 6 in Marietta Ga., AFP 4 in Fort Worth, Tx., AFP 44 in Tucson, Az., AFP 42 in Palmdale, Ca., and AFP PJKS in Denver, Co. Lockheed Martin corporation operates AFPs 4,6, PJKS and a portion of AFP 42 while AFP 44 is operated by Raytheon Missile Systems Company. Other GOCOs at AFP 42 are Northrup-Grumman, Boeing, and Cabaco, the facilities engineer. Since 1992 the Environmental Management division has conducted its Environmental Compliance Assessment and Management Program assessments (ECAMP) annually at each of the plants. Using DOD's ECAMP Team Guide and teams comprised of both Air Force and consultant engineering personnel, each plant is assessed for its environmental compliance well being. In the face of rising operational costs and diminishing budgets ASC/EM performed a comprehensive review of its ECAMP. As a result, the basic ECAMP program was improved to reduce costs without compromising on quality of the effort. The program retained its emphasis in providing a snap-shot evaluation of each Air Force plant's environmental compliance health supported by complete but tailored protocol assessments.

  9. Organizational Assessment Of Integrating CAD And Product Data Management Tools In The Furniture Industry

    E-Print Network [OSTI]

    Industry Furniture Manufacturing and Management Center Technical Report 1996-1997 Eric N. Wiebe Jennifer J of issues faced by furniture companies are given. The literature review closes by focusing on additional in manufacturing and design has popularized the concept of the virtual product database. Product Data Management

  10. Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems

    E-Print Network [OSTI]

    Hamedifar, Hamed

    2012-01-01T23:59:59.000Z

    G. (1996b). Quantitative and qualitative risk analyses – thefor the quantitative analysis of risks (probabilities anduseful is quantitative risk assessment? Risk Analysis Vol.

  11. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  12. PROGRAMMATIC ASSESSMENT OF RADIOACTIVE WASTE MANAGEMENT NUCLEAR FUEL AND WASTE PROGRAMS. Operational Planning and Development (Activity No. AR OS 10 05 K; ONL-WN06)

    SciTech Connect (OSTI)

    None

    1980-06-30T23:59:59.000Z

    Gilbert/Commonwealth (G/C) has performed an assessment of the waste management operations at Oak Ridge National Laboratory (ORNL). The objective of this study was to review radioactive waste management as practiced at ORNL and to recommend improvements or alternatives for further study. The study involved: 1) an on-site survey of ORNL radioactive waste management operations; 2) a review of radioactive waste source data, records, and regulatory requirements; 3) an assessment of existing and planned treatment, storage, and control facilities; and 4) identification of alternatives for improving waste management operations. Information for this study was obtained from both personal interviews and written reports. The G/C suggestions for improving ORNL waste management operations are summarized. Regulatory requirements governing ORNL waste management operations are discussed. Descriptions and discussions of the radioactive liquid, solid, and gaseous waste systems are presented. The waste operations control complex is discussed.

  13. Proceedings of the 1998 USCOLD Annual Lecture, Buffalo, New York. August 1998 PORTFOLIO RISK ASSESSMENT: A TOOL FOR DAM SAFETY RISK MANAGEMENT

    E-Print Network [OSTI]

    Bowles, David S.

    ASSESSMENT: A TOOL FOR DAM SAFETY RISK MANAGEMENT David S. Bowles1 , Loren R. Anderson2 , Terry F. Glover3 on to provide the basis for an effective and efficient program for managing and reducing dam safety risksProceedings of the 1998 USCOLD Annual Lecture, Buffalo, New York. August 1998 PORTFOLIO RISK

  14. Title: Use-inspired social science: RISA investigations of management needs for climate information and contributions to the National Climate Assessment

    E-Print Network [OSTI]

    Miami, University of

    Title: Use-inspired social science: RISA investigations of management needs for climate information The Regional Integrated Sciences and Assessments (RISA) program of the U.S. National Oceanic and Atmospheric of primarily social and physical science researchers are analyzing how climate affects management and planning

  15. RCRA Assessment Plan for Single-Shell Tank Waste Management Area B-BX-BY at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, Susan M.

    2006-09-29T23:59:59.000Z

    This document was prepared as a groundwater quality assessment plan revision for the single-shell tank systems in Waste Management Area B-BX-BY at the Hanford Site. Groundwater monitoring is conducted at this facility in accordance with 40 CFR Part 265, Subpart F. In FY 1996, the groundwater monitoring program was changed from detection-level indicator evaluation to a groundwater quality assessment program when elevated specific conductance in downgradient monitoring well 299 E33-32 was confirmed by verification sampling. During the course of the ensuing investigation, elevated technetium-99 and nitrate were observed above the drinking water standard at well 299-E33-41, a well located between 241-B and 241-BX Tank Farms. Earlier observations of the groundwater contamination and tank farm leak occurrences combined with a qualitative analysis of possible solutions, led to the conclusion that waste from the waste management area had entered the groundwater and were observed in this well. Based on 40 CFR 265.93 [d] paragraph (7), the owner-operator must continue to make the minimum required determinations of contaminant level and rate/extent of migrations on a quarterly basis until final facility closure. These continued determinations are required because the groundwater quality assessment was implemented prior to final closure of the facility.

  16. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  17. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  18. Using social network and stakeholder analysis to help evaluate infectious waste management: A step towards a holistic assessment

    SciTech Connect (OSTI)

    Caniato, Marco, E-mail: marcocaniato@gmail.com [University of Brescia, Research Centre on Appropriate Technologies for Environmental Management in Developing Countries (CeTAmb), Via Branze, 43, 25123 Brescia (Italy); Vaccari, Mentore, E-mail: mentore.vaccari@unibs.it [University of Brescia, Research Centre on Appropriate Technologies for Environmental Management in Developing Countries (CeTAmb), Via Branze, 43, 25123 Brescia (Italy); Visvanathan, Chettiyappan, E-mail: visu@ait.ac.th [Asian Institute of Technology (AIT), School of Environment, Resources and Development (SERD), P.O. Box 4, Klong Luang, Pathumthani 12120 (Thailand); Zurbrügg, Christian, E-mail: zurbrugg@eawag.ch [University of Brescia, Research Centre on Appropriate Technologies for Environmental Management in Developing Countries (CeTAmb), Via Branze, 43, 25123 Brescia (Italy); Eawag: Swiss Federal Institute of Aquatic Science and Technology, Department of Water and Sanitation in Developing Countries (Sandec), Ueberlandstrasse 133, 8600 Duebendorf (Switzerland)

    2014-05-01T23:59:59.000Z

    Highlights: • Assessment of infectious waste management in Bangkok, in particular incineration. • Integration of social network and stakeholder analysis assessment methods. • Assessment of stakeholder characteristics, role, interaction and communication. • Interviewees self-evaluate their own characteristics and the system. • Non-technical aspects are important for system acceptability, and sustainability. - Abstract: Assessing the strengths and weaknesses of a solid waste management scheme requires an accurate analysis and integration of several determining features. In addition to the technical aspects, any such system shows a complex interaction of actors with varying stakes, decision-making power and influence, as well as a favourable or disabling environment. When capitalizing on the knowledge and experience from a specific case, it is also crucial that experts do not “forget” or underestimate the importance of such social determinants and that they are familiar with the methods and tools to assess them. Social network analysis (SNA) and stakeholder analysis (SA) methods can be successfully applied to better understand actors’ role and actions, analyse driving forces and existing coordination among stakeholders, as well as identify bottlenecks in communication which affect daily operations or strategic planning for the future way forward. SNA and SA, appropriately adjusted for a certain system, can provide a useful integration to methods by assessing other aspects to ensure a comprehensive picture of the situation. This paper describes how to integrate SNA and SA in order to survey a solid waste management system. This paper presents the results of an analysis of On-Nuch infectious waste incinerator in Bangkok, Thailand. Stakeholders were interviewed and asked to prioritize characteristics and relationships which they consider particularly important for system development and success of the scheme. In such a way, a large quantity of information about organization, communication between stakeholders and their perception about operation, environmental and health impact, and potential alternatives for the system was collected in a systematic way. The survey results suggest that stakeholders are generally satisfied with the system operation, though communication should be improved. Moreover, stakeholders should be strategically more involved in system development planning, according to their characteristics, to prevent negative reactions.

  19. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Broader source: Energy.gov (indexed) [DOE]

    or update to version 7.2.1.4 Addthis Related Articles V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity...

  20. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified...

  1. Development and initial assessment of Texas Cooperative Extension's white-tailed dear management module 

    E-Print Network [OSTI]

    Bedgood, Mark Andrew

    2005-02-17T23:59:59.000Z

    The purpose of this study was to evaluate the development and initial use of Texas Cooperative Extension?s (TCE) White-tailed Deer Management Module (WDMM) delivered over the Internet. The results of this study will ...

  2. Assessment of the urban public's knowledge of white-tailed deer management in two Texas communities

    E-Print Network [OSTI]

    Alderson, Jessica Lynn

    2009-05-15T23:59:59.000Z

    Urbanization throughout much of Texas has resulted in diminished wildlife habitat, resulting from fragmented landscapes. Several previous studies addressed the public’s attitudes concerning the most acceptable white-tailed deer management techniques...

  3. U.S. Department of Energy worker health risk evaluation methodology for assessing risks associated with environmental restoration and waste management

    SciTech Connect (OSTI)

    Blaylock, B.P.; Legg, J.; Travis, C.C. [Oak Ridge National Lab., TN (United States). Center for Risk Management; Simek, M.A.; Sutherland, J. [Univ. of Tennessee, Knoxville, TN (United States); Scofield, P.A. [Office of Environmental Compliance and Documentation (United States)

    1995-06-01T23:59:59.000Z

    This document describes a worker health risk evaluation methodology for assessing risks associated with Environmental Restoration (ER) and Waste Management (WM). The methodology is appropriate for estimating worker risks across the Department of Energy (DOE) Complex at both programmatic and site-specific levels. This document supports the worker health risk methodology used to perform the human health risk assessment portion of the DOE Programmatic Environmental Impact Statement (PEIS) although it has applications beyond the PEIS, such as installation-wide worker risk assessments, screening-level assessments, and site-specific assessments.

  4. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  5. Bluetooth Vulnerabilities ECE 478 Winter 05

    E-Print Network [OSTI]

    Bluetooth Vulnerabilities ECE 478 Winter 05 Victor Yee #12;Topics · What is Bluetooth? · History ­ Automobiles #12;What is Bluetooth? · Short-range (10m-100m) wireless specification · Operating at 2.4GHz radio 2Mb/s #12;History · Named from Danish King Harold Bluetooth from the 10th century ­ instrumental

  6. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  7. Undergraduate business and management students’ experiences of being involved in assessment 

    E-Print Network [OSTI]

    Tai, Chunming

    2012-11-29T23:59:59.000Z

    This study aimed to explore university undergraduates’ experiences of student involvement in assessment (SIA). Based on Biggs’ 3P model of student learning, this study focused on students’ experiences prior to SIA, during ...

  8. Methods for managing uncertainly in material selection decisions : robustness of early stage life cycle assessment

    E-Print Network [OSTI]

    Nicholson, Anna L. (Anna Louise)

    2009-01-01T23:59:59.000Z

    Utilizing alternative materials is an important tactic to improve the environmental performance of products. Currently a growing array of materials candidates confronts today's product designer. While life-cycle assessment ...

  9. Assessment of sludge management options in a waste water treatment plant

    E-Print Network [OSTI]

    Lim, Jong hyun, M. Eng. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    This thesis is part of a larger project which began in response to a request by the Spanish water agengy, Cadagua, for advice on life cycle assessment (LCA) and environmental impacts of Cadagua operated wastewater treatment ...

  10. Waste management health risk assessment: A case study of a solid waste landfill in South Italy

    SciTech Connect (OSTI)

    Davoli, E., E-mail: enrico.davoli@marionegri.i [Istituto di Ricerche Farmacologiche 'Mario Negri', Environmental Health Sciences Department, Via Giuseppe La Masa 19, 20156 Milano (Italy); Fattore, E.; Paiano, V.; Colombo, A.; Palmiotto, M. [Istituto di Ricerche Farmacologiche 'Mario Negri', Environmental Health Sciences Department, Via Giuseppe La Masa 19, 20156 Milano (Italy); Rossi, A.N.; Il Grande, M. [Progress S.r.l., Via Nicola A. Porpora 147, 20131 Milano (Italy); Fanelli, R. [Istituto di Ricerche Farmacologiche 'Mario Negri', Environmental Health Sciences Department, Via Giuseppe La Masa 19, 20156 Milano (Italy)

    2010-08-15T23:59:59.000Z

    An integrated risk assessment study has been performed in an area within 5 km from a landfill that accepts non hazardous waste. The risk assessment was based on measured emissions and maximum chronic population exposure, for both children and adults, to contaminated air, some foods and soil. The toxic effects assessed were limited to the main known carcinogenic compounds emitted from landfills coming both from landfill gas torch combustion (e.g., dioxins, furans and polycyclic aromatic hydrocarbons, PAHs) and from diffusive emissions (vinyl chloride monomer, VCM). Risk assessment has been performed both for carcinogenic and non-carcinogenic effects. Results indicate that cancer and non-cancer effects risk (hazard index, HI) are largely below the values accepted from the main international agencies (e.g., WHO, US EPA) and national legislation ( and ).

  11. Semi-annual report of the Department of Energy Office of Environmental Management quality assessment program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.

    1997-01-01T23:59:59.000Z

    This report presents the results from the soil inorganic analysis of the 45th set of environmental quality assessment samples (QAP XLV) that were received on or before December 2, 1996.

  12. Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems

    E-Print Network [OSTI]

    Hamedifar, Hamed

    2012-01-01T23:59:59.000Z

    G.E. (2004) How useful is quantitative risk assessment?Risk Analysis Vol. 24 No. 3, pp. 515-520 Atwater, BF (Quantitative and qualitative risk analyses – the safety of

  13. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  14. PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Hultman, Nathan E.

    PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE A Quantitative Approach R. H. Moss A. L. Brenkert E@ntis.fedworld.gov Online ordering: http://www.ntis.gov/ordering.htm #12;iii EXECUTIVE SUMMARY The PNNL Vulnerability

  15. Cyber Vulnerability Disclosure Policies for the Department of Electrical and

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber Vulnerability Disclosure Policies for the Smart Grid Adam Hahn Department of Electrical ATTRIBUTES The "Vulnerability Disclosure Framework" developed by the National Infrastructure Advisory Council Department of Electrical and Computer Engineering Iowa State University Ames, IA 50011 Email: gmani

  16. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  17. Timber management and use-value assessment. Forest Service research paper (Final)

    SciTech Connect (OSTI)

    Sendak, P.E.; Huyler, N.K.

    1994-12-14T23:59:59.000Z

    Describes timber management activity and estimates timber harvest from forest land enrolled in Vermont`s Use Value Appraisal (UVA) Forest Land property tax program. Data were compiled from the mandatory management plans and annual conformance reports filed for each property enrolled in the Program. Overall, 31 percent of the UVA properties reported a commercial harvest during 1989. The harvest on enrolled lands represented 18 percent and 24 percent, respectively, of the reported total sawlog and pulpwood-fuelwood harvest in Vermont in 1989, while enrolled lands represented about 16 percent of the total timberland in the State.

  18. Office of Enterprise Assessments Lessons Learned from the 2014 Emergency Management Review - April 2015

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagementOPAM PolicyOf Environmental ManagementRollout -Summary Lessons

  19. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  20. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  1. Self-perceptions of volunteer management:: a texas 4-h volunteer needs assessment

    E-Print Network [OSTI]

    Torock, Jodi Lynn

    2009-05-15T23:59:59.000Z

    study. I appreciate all of the time and energy you put into assisting me with the development, administration, and reminders for the questionnaire and helping me learn more about the 4-H program in Texas. Your work has not gone unnoticed. I hope... .................................................................................. 7 Models of Volunteer Administration ............................................. 9 The Role of the 4-H Volunteer ....................................................... 12 Volunteer Management...

  2. Life cycle assessment of urban waste management: Energy performances and environmental impacts. The case of Rome, Italy

    SciTech Connect (OSTI)

    Cherubini, Francesco [Joanneum Research, Elisabethstrasse 5, 8010, Graz (Austria)], E-mail: cherufra@yahoo.it; Bargigli, Silvia; Ulgiati, Sergio [Universita degli Studi di Napoli 'Parthenope', Dipartimento di Scienze per l'Ambiente, Centro Direzionale, Isola C4, 80133 Napoli (Italy)

    2008-12-15T23:59:59.000Z

    Landfilling is nowadays the most common practice of waste management in Italy in spite of enforced regulations aimed at increasing waste pre-sorting as well as energy and material recovery. In this work we analyse selected alternative scenarios aimed at minimizing the unused material fraction to be delivered to the landfill. The methodological framework of the analysis is the life cycle assessment, in a multi-method form developed by our research team. The approach was applied to the case of municipal solid waste (MSW) management in Rome, with a special focus on energy and material balance, including global and local scale airborne emissions. Results, provided in the form of indices and indicators of efficiency, effectiveness and environmental impacts, point out landfill activities as the worst waste management strategy at a global scale. On the other hand, the investigated waste treatments with energy and material recovery allow important benefits of greenhouse gas emission reduction (among others) but are still affected by non-negligible local emissions. Furthermore, waste treatments leading to energy recovery provide an energy output that, in the best case, is able to meet 15% of the Rome electricity consumption.

  3. Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management »EnergyHubs |

  4. Assessing the Vulnerability of the Fiber Infrastructure to Disasters

    E-Print Network [OSTI]

    Cohen, Reuven

    , as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real-world events-optic, Electromagnetic Pulse (EMP). I. INTRODUCTION The global communications infrastructure is primarily based on fiber by any- thing from Electromagnetic Pulse (EMP) attacks [14], [15], [31] to dragging anchors [8], [36

  5. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAMGeneral GuidanceEnergyServices »Department|

  6. India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, search OpenEIHesperia,IDGWP WindSatelliteInSAR JumpRenewableChange | Open Energy

  7. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationin UrbanCityCoated Conductors CylinderColombia Ministry

  8. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationin UrbanCityCoated Conductors CylinderColombia MinistryCartagena

  9. Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia: Energy ResourcesInformation

  10. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOE FYAffairs, and InternationalPlanning,Analysis

  11. Damage Assessment Technologies for Prognostics and Proactive Management of Materials Degradation

    SciTech Connect (OSTI)

    Bond, Leonard J.; Doctor, Steven R.; Griffin, Jeffrey W.; Hull, Amy; Malik, Shah

    2011-02-26T23:59:59.000Z

    The Nuclear Regulatory Commission has undertaken a program to lay the groundwork for defining proactive actions to manage degradation of materials in light water reactors (LWRs). This paper discusses the U.S. Nuclear Regulatory Commission’s Proactive Management of Materials Degradation (PMMD) program and its application to nuclear power plant structures, systems and components. The PMMD program is examining LWR component materials and the degradation phenomena that affect them. Of particular interest is how such phenomena can be monitored to predict degradation and prevent component failure. Some forms of degradation, such as stress corrosion cracking, are characterized by a long initiation time followed by a rapid growth phase. Monitoring such long-term degradation will require new NDE methods and measurement procedures. A critical analysis of all reactor components is required to determine if new inspection strategies are required to effectively manage slow degradation mechanisms that may lead to component failure. As reactor lifetimes are extended, degradation mechanisms previously considered too long-term to be of consequence (such as concrete and wiring insulation degradation) may become more important. This paper includes a review of techniques with potential for sensing and monitoring degradation in its early stages and will concisely explain the basic principles of PMMD and its relationship to in-service inspection, condition based maintenance, and advanced diagnostics and prognostics.

  12. Damage Assessment Technologies for Prognostics and Proactive Management of Materials Degradation

    SciTech Connect (OSTI)

    Bond, Leonard J.; Doctor, Steven R.; Griffin, Jeffrey W.; Hull, Amy B.; Malik, Shah

    2011-01-01T23:59:59.000Z

    The Nuclear Regulatory Commission has undertaken a program to lay the groundwork for defining proactive actions to manage degradation of materials in light water reactors (LWRs). This paper discusses the U.S. Nuclear Regulatory Commission’s Proactive Management of Materials Degradation (PMMD) program and its application to nuclear power plant structures, systems and components. The PMMD program is examining LWR component materials and the degradation phenomena that affect them. Of particular interest is how such phenomena can be monitored to predict degradation and prevent component failure. Some forms of degradation, including some modes of stress corrosion cracking, are characterized by a long initiation time followed by a rapid growth phase. Monitoring such long-term degradation will require new non-destructive evaluation (NDE) methods and measurement procedures. A critical analysis of all reactor components is required to determine if new inspection strategies are required to effectively manage slow degradation mechanisms that may lead to component failure. As reactor lifetimes are extended, degradation mechanisms previously considered too long-term to be of consequence (such as concrete and wiring insulation degradation) may become more important. This paper includes a review of techniques with potential for sensing and monitoring degradation in its early stages and will concisely explain the basic principles of PMMD and its relationship to in-service inspection, condition based maintenance, and advanced diagnostics and prognostics.

  13. Sandia National Laboratories performance assessment methodology for long-term environmental programs : the history of nuclear waste management.

    SciTech Connect (OSTI)

    Marietta, Melvin Gary; Anderson, D. Richard; Bonano, Evaristo J.; Meacham, Paul Gregory (Raytheon Ktech, Albuquerque, NM)

    2011-11-01T23:59:59.000Z

    Sandia National Laboratories (SNL) is the world leader in the development of the detailed science underpinning the application of a probabilistic risk assessment methodology, referred to in this report as performance assessment (PA), for (1) understanding and forecasting the long-term behavior of a radioactive waste disposal system, (2) estimating the ability of the disposal system and its various components to isolate the waste, (3) developing regulations, (4) implementing programs to estimate the safety that the system can afford to individuals and to the environment, and (5) demonstrating compliance with the attendant regulatory requirements. This report documents the evolution of the SNL PA methodology from inception in the mid-1970s, summarizing major SNL PA applications including: the Subseabed Disposal Project PAs for high-level radioactive waste; the Waste Isolation Pilot Plant PAs for disposal of defense transuranic waste; the Yucca Mountain Project total system PAs for deep geologic disposal of spent nuclear fuel and high-level radioactive waste; PAs for the Greater Confinement Borehole Disposal boreholes at the Nevada National Security Site; and PA evaluations for disposal of high-level wastes and Department of Energy spent nuclear fuels stored at Idaho National Laboratory. In addition, the report summarizes smaller PA programs for long-term cover systems implemented for the Monticello, Utah, mill-tailings repository; a PA for the SNL Mixed Waste Landfill in support of environmental restoration; PA support for radioactive waste management efforts in Egypt, Iraq, and Taiwan; and, most recently, PAs for analysis of alternative high-level radioactive waste disposal strategies including repositories deep borehole disposal and geologic repositories in shale and granite. Finally, this report summarizes the extension of the PA methodology for radioactive waste disposal toward development of an enhanced PA system for carbon sequestration and storage systems. These efforts have produced a generic PA methodology for the evaluation of waste management systems that has gained wide acceptance within the international community. This report documents how this methodology has been used as an effective management tool to evaluate different disposal designs and sites; inform development of regulatory requirements; identify, prioritize, and guide research aimed at reducing uncertainties for objective estimations of risk; and support safety assessments.

  14. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.; Pan, V.

    1995-07-03T23:59:59.000Z

    This report presents the results from the analysis of the 42st set of environmental quality assessment samples (QAP XLII) that were received on or before June 1, 1995. This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 2 days after the reporting deadline via a modem-telephone connection to the EML computer.

  15. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, P.D.; Minick, S.K.

    1998-07-01T23:59:59.000Z

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. This report presents the results from the analysis of the 48th set of environmental quality assessment samples (QAP XLVIII) that were received on or before June 1, 1998.

  16. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.

    1996-02-01T23:59:59.000Z

    This report presents the results from the analysis of the 43rd set of environmental quality assessment samples (QAP XLIII) that were received on or before December 1, 1995. This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 2 days after the reporting deadline via a modem-telephone connection to the EML computer.

  17. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, P.D.

    1998-01-01T23:59:59.000Z

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 4 days after the reporting deadline via the Internet at www.eml.doe.gov. This report presents the results from the analysis of the 47th set of environmental quality assessment samples (QAP XLVII) that were received on or before December 1, 1997.

  18. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Sanderson, C.G.; Greenlaw, P.

    1996-07-01T23:59:59.000Z

    This report presents the results from the analysis of the 44th set of environmental quality assessment samples (QAP XLIV) that were received on or before June 3, 1996. The QAP is designed to test the quality of environmental measurements being reported to the Department of Energy by it`s contractors. Since 1976, samples have been prepared and analyzed by the Environmental measurements Laboratory.

  19. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy| Department

  20. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac

  1. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment

  2. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment of

  3. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment| Department of

  4. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|

  5. A multi-objective programming model for assessment the GHG emissions in MSW management

    SciTech Connect (OSTI)

    Mavrotas, George, E-mail: mavrotas@chemeng.ntua.gr [National Technical University of Athens, Iroon Polytechniou 9, Zografou, Athens, 15780 (Greece); Skoulaxinou, Sotiria [EPEM SA, 141 B Acharnon Str., Athens, 10446 (Greece); Gakis, Nikos [FACETS SA, Agiou Isidorou Str., Athens, 11471 (Greece); Katsouros, Vassilis [Athena Research and Innovation Center, Artemidos 6 and Epidavrou Str., Maroussi, 15125 (Greece); Georgopoulou, Elena [National Observatory of Athens, Thisio, Athens, 11810 (Greece)

    2013-09-15T23:59:59.000Z

    Highlights: • The multi-objective multi-period optimization model. • The solution approach for the generation of the Pareto front with mathematical programming. • The very detailed description of the model (decision variables, parameters, equations). • The use of IPCC 2006 guidelines for landfill emissions (first order decay model) in the mathematical programming formulation. - Abstract: In this study a multi-objective mathematical programming model is developed for taking into account GHG emissions for Municipal Solid Waste (MSW) management. Mathematical programming models are often used for structure, design and operational optimization of various systems (energy, supply chain, processes, etc.). The last twenty years they are used all the more often in Municipal Solid Waste (MSW) management in order to provide optimal solutions with the cost objective being the usual driver of the optimization. In our work we consider the GHG emissions as an additional criterion, aiming at a multi-objective approach. The Pareto front (Cost vs. GHG emissions) of the system is generated using an appropriate multi-objective method. This information is essential to the decision maker because he can explore the trade-offs in the Pareto curve and select his most preferred among the Pareto optimal solutions. In the present work a detailed multi-objective, multi-period mathematical programming model is developed in order to describe the waste management problem. Apart from the bi-objective approach, the major innovations of the model are (1) the detailed modeling considering 34 materials and 42 technologies, (2) the detailed calculation of the energy content of the various streams based on the detailed material balances, and (3) the incorporation of the IPCC guidelines for the CH{sub 4} generated in the landfills (first order decay model). The equations of the model are described in full detail. Finally, the whole approach is illustrated with a case study referring to the application of the model in a Greek region.

  6. Assessing the Potential for Renewable Energy Development on DOE Legacy Management Lands

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management »EnergyHubs | DepartmentCloudLegacy

  7. Distrbuted Sensing Systems for Water Quality Assesment and Management

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Sensing Systems for Water Quality Assessment and ManagementSensing Systems for Water Quality Assessment and ManagementSensing Systems for Water Quality Assessment and Management

  8. Flood Assessment at the Area 5 Radioactive Waste Management Site and the Proposed Hazardous Waste Storage Unit, DOE/Nevada Test Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Schmeltzer, J. S., Millier, J. J., Gustafson, D. L.

    1993-01-01T23:59:59.000Z

    A flood assessment at the Radioactive Waste Management Site (RWMS) and the proposed Hazardous Waste Storage Unit (HWSU) in Area 5 of the Nevada Test Site (NTS) was performed to determine the 100-year flood hazard at these facilities. The study was conducted to determine whether the RWMS and HWSU are located within a 100-year flood hazard as defined by the Federal Emergency Management Agency, and to provide discharges for the design of flood protection.

  9. Risk assessment and optimization (ALARA) analysis for the environmental remediation of Brookhaven National Laboratory`s hazardous waste management facility

    SciTech Connect (OSTI)

    Dionne, B.J.; Morris, S. III; Baum, J.W. [and others

    1998-03-01T23:59:59.000Z

    The Department of Energy`s (DOE) Office of Environment, Safety, and Health (EH) sought examples of risk-based approaches to environmental restoration to include in their guidance for DOE nuclear facilities. Extensive measurements of radiological contamination in soil and ground water have been made at Brookhaven National Laboratory`s Hazardous Waste Management Facility (HWMF) as part of a Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) remediation process. This provided an ideal opportunity for a case study. This report provides a risk assessment and an {open_quotes}As Low as Reasonably Achievable{close_quotes} (ALARA) analysis for use at other DOE nuclear facilities as an example of a risk-based decision technique.

  10. Wetland Plant Guide for Assessing Habitat Impacts of Real-Time Salinity Management

    SciTech Connect (OSTI)

    Quinn, Nigel W.T.; Feldmann, Sara A.

    2004-10-15T23:59:59.000Z

    This wetland plant guide was developed to aid moist soil plant identification and to assist in the mapping of waterfowl and shorebird habitat in the Grassland Water District and surrounding wetland areas. The motivation for this habitat mapping project was a concern that real-time salinity management of wetland drainage might have long-term consequences for wildfowl habitat health--changes in wetland drawdown schedules might, over the long term, lead to increased soil salinity and other conditions unfavorable to propagation of the most desirable moist soil plants. Hence, the implementation of a program to monitor annual changes in the most common moist soil plants might serve as an index of habitat health and sustainability. Our review of the current scientific and popular literature failed to identify a good, comprehensive field guide that could be used to calibrate and verify high resolution remote sensing imagery, that we had started to use to develop maps of wetland moist soil plants in the Grassland Water District. Since completing the guide it has been used to conduct ground truthing field surveys using the California Native Plant Society methodology in 2004. Results of this survey and a previous wetland plant survey in 2003 are published in a companion LBNL publication summarizing 4 years of fieldwork to advance the science of real-time wetland salinity management.

  11. Results of phase 1 groundwater quality assessment for Single-Shell Tank Waste Management Areas B-BX-BY at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, S.M.

    1998-02-01T23:59:59.000Z

    Pacific Northwest National Laboratory conducted a Phase 1 (or first determination) groundwater quality assessment for the US Department of Energy, Richland Operations Office, in accordance with the Federal Facility Compliance Agreement. The purpose of the assessment was to determine if the Single-Shell Tank Waste Management Area (WMA) B-BX-BY has impacted groundwater quality. This report will document the evidence demonstrating that the WMA has impacted groundwater quality.

  12. Material Aging and Degradation Detection and Remaining Life Assessment for Plant Life Management

    SciTech Connect (OSTI)

    Ramuhalli, Pradeep; Henager, Charles H.; Griffin, Jeffrey W.; Meyer, Ryan M.; Coble, Jamie B.; Pitman, Stan G.; Bond, Leonard J.

    2012-12-31T23:59:59.000Z

    One of the major factors that may impact long term operations is structural material degradation, Detecting materials degradation, estimating the remaining useful life (RUL) of the component, and determining approaches to mitigating the degradation are important from the perspective of long term operations. In this study, multiple nondestructive measurement and monitoring methods were evaluated for their ability to assess the material degradation state. Metrics quantifying the level of damage from these measurements were defined, and evaluated for their ability to provide estimates of remaining life of the component. An example of estimating the RUL from nondestructive measurements of material degradation condition is provided.

  13. Waste Management Recommendations in the Texas A&M University Industrial Assessment Center Program 

    E-Print Network [OSTI]

    Eggebrecht, J. A.; Heffington, W. M.

    1996-01-01T23:59:59.000Z

    that result from our assessments very seldom involve "rocket science." In fact, most of them come from the advantage of having, or keeping, a fresh outlook on the practices in the plant. This fresh outlook involves asking the question "Where in the entire... by the plant personnel that it is a considerable help to them to have a fresh set of eyes looking at what they do to discover where it can be improved. This fresh outlook is difficult to maintain when the major concerns of plant personnel are to keep...

  14. Running Head: Ecosystem Energy and Conservation1 Ecosystem Energy as a Framework for Prioritizing Conservation Vulnerabilities and3

    E-Print Network [OSTI]

    Hansen, Andrew J.

    1 Running Head: Ecosystem Energy and Conservation1 2 Ecosystem Energy as a Framework for Prioritizing Conservation Vulnerabilities and3 Management Strategies4 5 Andrew James Hansen6 Ecology property, ecosystem energy levels, which,14 while once widely recognized as important, has received little

  15. Life cycle assessment of four municipal solid waste management scenarios in China

    SciTech Connect (OSTI)

    Hong Jinglan, E-mail: hongjing@sdu.edu.c [School of Environmental Science and Engineering, Shandong University, Jinan 250100 (China); Li Xiangzhi [Department of Pathology, University of Michigan, 1301 Catherine, Ann Arbor, MI 48109 (United States); Zhaojie Cui [School of Environmental Science and Engineering, Shandong University, Jinan 250100 (China)

    2010-11-15T23:59:59.000Z

    A life cycle assessment was carried out to estimate the environmental impact of municipal solid waste. Four scenarios mostly used in China were compared to assess the influence of various technologies on environment: (1) landfill, (2) incineration, (3) composting plus landfill, and (4) composting plus incineration. In all scenarios, the technologies significantly contribute to global warming and increase the adverse impact of non-carcinogens on the environment. The technologies played only a small role in the impact of carcinogens, respiratory inorganics, terrestrial ecotoxicity, and non-renewable energy. Similarly, the influence of the technologies on the way other elements affect the environment was ignorable. Specifically, the direct emissions from the operation processes involved played an important role in most scenarios except for incineration, while potential impact generated from transport, infrastructure and energy consumption were quite small. In addition, in the global warming category, highest potential impact was observed in landfill because of the direct methane gas emissions. Electricity recovery from methane gas was the key factor for reducing the potential impact of global warming. Therefore, increasing the use of methane gas to recover electricity is highly recommended to reduce the adverse impact of landfills on the environment.

  16. Preliminary assessment of radiological doses in alternative waste management systems without an MRS facility

    SciTech Connect (OSTI)

    Schneider, K.J.; Pelto, P.J.; Daling, P.M.; Lavender, J.C.; Fecht, B.A.

    1986-06-01T23:59:59.000Z

    This report presents generic analyses of radiological dose impacts of nine hypothetical changes in the operation of a waste management system without a monitored retrievable storage (MRS) facility. The waste management activities examined in this study include those for handling commercial spent fuel at nuclear power reactors and at the surface facilities of a deep geologic repository, and the transportation of spent fuel by rail and truck between the reactors and the repository. In the reference study system, the radiological doses to the public and to the occupational workers are low, about 170 person-rem/1000 metric ton of uranium (MTU) handled with 70% of the fuel transported by rail and 30% by truck. The radiological doses to the public are almost entirely from transportation, whereas the doses to the occupational workers are highest at the reactors and the repository. Operating alternatives examined included using larger transportation casks, marshaling rail cars into multicar dedicated trains, consolidating spent fuel at the reactors, and wet or dry transfer options of spent fuel from dry storage casks. The largest contribution to radiological doses per unit of spent fuel for both the public and occupational workers would result from use of truck transportation casks, which are smaller than rail casks. Thus, reducing the number of shipments by increasing cask sizes and capacities (which also would reduce the number of casks to be handled at the terminals) would reduce the radiological doses in all cases. Consolidating spent fuel at the reactors would reduce the radiological doses to the public but would increase the doses to the occupational workers at the reactors.

  17. Towards Adaptive Educational Assessments: Predicting Student Performance using Temporal Stability and Data Analytics in Learning Management Systems

    SciTech Connect (OSTI)

    Thakur, Gautam [ORNL] [ORNL; Olama, Mohammed M [ORNL] [ORNL; McNair, Wade [ORNL] [ORNL; Sukumar, Sreenivas R [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    Data-driven assessments and adaptive feedback are becoming a cornerstone research in educational data analytics and involve developing methods for exploring the unique types of data that come from the educational context. For example, predicting college student performance is crucial for both the students and educational institutions. It can support timely intervention to prevent students from failing a course, increasing efficacy of advising functions, and improving course completion rate. In this paper, we present our efforts in using data analytics that enable educationists to design novel data-driven assessment and feedback mechanisms. In order to achieve this objective, we investigate temporal stability of students grades and perform predictive analytics on academic data collected from 2009 through 2013 in one of the most commonly used learning management systems, called Moodle. First, we have identified the data features useful for assessments and predicting student outcomes such as students scores in homework assignments, quizzes, exams, in addition to their activities in discussion forums and their total Grade Point Average(GPA) at the same term they enrolled in the course. Second, time series models in both frequency and time domains are applied to characterize the progression as well as overall projections of the grades. In particular, the model analyzed the stability as well as fluctuation of grades among students during the collegiate years (from freshman to senior) and disciplines. Third, Logistic Regression and Neural Network predictive models are used to identify students as early as possible who are in danger of failing the course they are currently enrolled in. These models compute the likelihood of any given student failing (or passing) the current course. The time series analysis indicates that assessments and continuous feedback are critical for freshman and sophomores (even with easy courses) than for seniors, and those assessments may be provided using the predictive models. Numerical results are presented to evaluate and compare the performance of the developed models and their predictive accuracy. Our results show that there are strong ties associated with the first few weeks for coursework and they have an impact on the design and distribution of individual modules.

  18. Improved methodology to assess modification and completion of landfill gas management in the aftercare period

    SciTech Connect (OSTI)

    Morris, Jeremy W.F., E-mail: jmorris@geosyntec.com [Geosyntec Consultants, 10220 Old Columbia Road, Suite A, Columbia, MD 21046 (United States); Crest, Marion, E-mail: marion.crest@suez-env.com [Suez Environnement, 38 rue du President Wilson, 78230 Le Pecq (France); Barlaz, Morton A., E-mail: barlaz@ncsu.edu [Department of Civil, Construction, and Environmental Engineering, Campus Box 7908, North Carolina State University, Raleigh, NC 27695-7908 (United States); Spokas, Kurt A., E-mail: kurt.spokas@ars.usda.gov [United States Department of Agriculture - Agricultural Research Service, 1991 Upper Buford Circle, 439 Borlaug Hall, St. Paul, MN 55108 (United States); Akerman, Anna, E-mail: anna.akerman@sita.fr [SITA France, Tour CB 21, 16 Place de l'Iris, 92040 Paris La Defense Cedex (France); Yuan, Lei, E-mail: lyuan@geosyntec.com [Geosyntec Consultants, 10220 Old Columbia Road, Suite A, Columbia, MD 21046 (United States)

    2012-12-15T23:59:59.000Z

    Highlights: Black-Right-Pointing-Pointer Performance-based evaluation of landfill gas control system. Black-Right-Pointing-Pointer Analytical framework to evaluate transition from active to passive gas control. Black-Right-Pointing-Pointer Focus on cover oxidation as an alternative means of passive gas control. Black-Right-Pointing-Pointer Integrates research on long-term landfill behavior with practical guidance. - Abstract: Municipal solid waste landfills represent the dominant option for waste disposal in many parts of the world. While some countries have greatly reduced their reliance on landfills, there remain thousands of landfills that require aftercare. The development of cost-effective strategies for landfill aftercare is in society's interest to protect human health and the environment and to prevent the emergence of landfills with exhausted aftercare funding. The Evaluation of Post-Closure Care (EPCC) methodology is a performance-based approach in which landfill performance is assessed in four modules including leachate, gas, groundwater, and final cover. In the methodology, the objective is to evaluate landfill performance to determine when aftercare monitoring and maintenance can be reduced or possibly eliminated. This study presents an improved gas module for the methodology. While the original version of the module focused narrowly on regulatory requirements for control of methane migration, the improved gas module also considers best available control technology for landfill gas in terms of greenhouse gas emissions, air quality, and emissions of odoriferous compounds. The improved module emphasizes the reduction or elimination of fugitive methane by considering the methane oxidation capacity of the cover system. The module also allows for the installation of biologically active covers or other features designed to enhance methane oxidation. A methane emissions model, CALMIM, was used to assist with an assessment of the methane oxidation capacity of landfill covers.

  19. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15T23:59:59.000Z

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  20. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  1. T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

  2. Assessing the Situation at El Pilar: Chronology, Survey, Conservation, and Management Planning for the 21st Century

    E-Print Network [OSTI]

    Ford, Anabel; Wernecke, Clark

    2000-01-01T23:59:59.000Z

    CHRONOLOGY, SURVEY, CONSERVATION, AND MANAGEMENT PLANNINGsurvey inventory, resource conservation, and managementsurvey protocol and field test would be important to the development of management

  3. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  4. Indirect Assessment: Sport management candidates are required to complete a graduating senior survey, which is based on the program's learning outcomes. The results of this survey are analyzed by program faculty and used to make curricular changes as nece

    E-Print Network [OSTI]

    Asaithambi, Asai

    Indirect Assessment: Sport management candidates are required to complete a graduating senior survey, which is based on the program's learning outcomes. The results of this survey are analyzed by program faculty and used to make curricular changes as necessary. Direct Assessment: Sport Management

  5. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  6. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power...

  7. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  8. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  9. areas vulnerabilities impacts: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

  10. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  11. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  12. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  13. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Belgium) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Belgium Coordinates...

  14. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Czech Republic) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Czech Republic...

  15. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

  16. Quality-of-Life Assessment After Palliative Interventions to Manage Malignant Ureteral Obstruction

    SciTech Connect (OSTI)

    Monsky, Wayne Laurence, E-mail: wemonsky@msn.com [University of Washington Medical Center, Department of Radiology (United States); Molloy, Chris; Jin, Bedro [University of California, Davis, School of Medicine (United States)] [University of California, Davis, School of Medicine (United States); Nolan, Timothy; Fernando, Dayantha; Loh, Shaun [University of California Davis Medical Center, Department of Radiology (United States)] [University of California Davis Medical Center, Department of Radiology (United States); Li, Chin-Shang [University of California, Davis, Division of Biostatistics, Department of Public Health Sciences (Canada)] [University of California, Davis, Division of Biostatistics, Department of Public Health Sciences (Canada)

    2013-10-15T23:59:59.000Z

    Purpose: Malignancies may cause urinary tract obstruction, which is often relieved with placement of a percutaneous nephrostomy tube, an internal double J nephro-ureteric stent (double J), or an internal external nephroureteral stent (NUS). We evaluated the affect of these palliative interventions on quality of life (QoL) using previously validated surveys. Methods: Forty-six patients with malignancy related ureteral obstruction received nephrostomy tubes (n = 16), double J stents (n = 15), or NUS (n = 15) as determined by a multidisciplinary team. QoL surveys were administered at 7, 30, and 90 days after the palliative procedure to evaluate symptoms and physical, social, functional, and emotional well-being. Number of related procedures, fluoroscopy time, and complications were documented. Kruskal-Wallis and Friedman's test were used to compare patients at 7, 30, and 90 days. Spearman's rank correlation coefficient was used to assess correlations between clinical outcomes/symptoms and QoL. Results: Responses to QoL surveys were not significantly different for patients receiving nephrostomies, double J stents, or NUS at 7, 30, or 90 days. At 30 and 90 days there were significantly higher reported urinary symptoms and pain in those receiving double J stents compared with nephrostomies (P = 0.0035 and P = 0.0189, respectively). Significantly greater fluoroscopy time was needed for double J stent-related procedures (P = 0.0054). Nephrostomy tubes were associated with more frequent minor complications requiring additional changes. Conclusion: QoL was not significantly different. However, a greater incidence of pain in those receiving double J stents and more frequent tube changes in those with nephrostomy tubes should be considered when choosing palliative approaches.

  17. Taking Risk Assessment and Management to the Next Level: Program-Level Risk Analysis to Enable Solid Decision-Making on Priorities and Funding

    SciTech Connect (OSTI)

    Nelson, J. G.; Morton, R. L.; Castillo, C.; Dyer, G.; Johnson, N.; McSwain, J. T.

    2011-02-01T23:59:59.000Z

    A multi-level (facility and programmatic) risk assessment was conducted for the facilities in the Nevada National Security Site (NNSS) Readiness in Technical Base and Facilities (RTBF) Program and results were included in a new Risk Management Plan (RMP), which was incorporated into the fiscal year (FY) 2010 Integrated Plans. Risks, risk events, probability, consequence(s), and mitigation strategies were identified and captured, for most scope areas (i.e., risk categories) during the facilitated risk workshops. Risk mitigations (i.e., efforts in addition to existing controls) were identified during the facilitated risk workshops when the risk event was identified. Risk mitigation strategies fell into two broad categories: threats or opportunities. Improvement projects were identified and linked to specific risks they mitigate, making the connection of risk reduction through investments for the annual Site Execution Plan. Due to the amount of that was collected, analysis to be performed, and reports to be generated, a Risk Assessment/ Management Tool (RAMtool) database was developed to analyze the risks in real-time, at multiple levels, which reinforced the site-level risk management process and procedures. The RAMtool database was developed and designed to assist in the capturing and analysis of the key elements of risk: probability, consequence, and impact. The RAMtool calculates the facility-level and programmatic-level risk factors to enable a side-by-side comparison to see where the facility manager and program manager should focus their risk reduction efforts and funding. This enables them to make solid decisions on priorities and funding to maximize the risk reduction. A more active risk management process was developed where risks and opportunities are actively managed, monitored, and controlled by each facility more aggressively and frequently. risk owners have the responsibility and accountability to manage their assigned risk in real-time, using the RAMtool database.

  18. Seismic assessment strategies for masonry structures

    E-Print Network [OSTI]

    DeJong, Matthew J. (Matthew Justin)

    2009-01-01T23:59:59.000Z

    Masonry structures are vulnerable to earthquakes, but their seismic assessment remains a challenge. This dissertation develops and improves several strategies to better understand the behavior of masonry structures under ...

  19. Importance-Scanning Worm Using Vulnerable-Host Distribution

    E-Print Network [OSTI]

    Ji, Chuanyi

    Importance-Scanning Worm Using Vulnerable-Host Distribution Zesheng Chen School of Electrical scanning. The distribution of vulnerable hosts on the Internet, however, is highly non- uniform over the IP-address space. This implies that random scanning wastes many scans on invulnerable addresses, and more virulent

  20. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  1. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  2. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01T23:59:59.000Z

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  3. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    of California. This paper describes the development and results from an integrated water resource management application includes management of reservoirs, run-of-river hydropower plants, water supply demand locations. Reservoir operations adapt to capture earlier and greater runoff volumes that result from earlier

  4. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L., E-mail: jalonne@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 109 S. Observatory, SPH II, Rm. M6314, Ann Arbor, MI 48109 (United States); Sanchez, Brisa N., E-mail: brisa@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Jolliet, Olivier, E-mail: ojolliet@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Zhang, Zhenzhen, E-mail: zhzh@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Parker, Edith A., E-mail: Edith-Parker@uiowa.edu [University of Michigan School of Public Health, Health Behavior and Health Education Department, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Timothy Dvonch, J., E-mail: dvonch@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 1415 Washington Heights, 6642 SPH Tower, Ann Arbor, MI 48109 (United States); O'Neill, Marie S., E-mail: marieo@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6631 SPH Tower, 1415 Washington Heights, Ann Arbor, MI 48109 (United States)

    2012-01-15T23:59:59.000Z

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  5. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect (OSTI)

    Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01T23:59:59.000Z

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  6. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  7. MARCH 18, 2013 AUDIT REPORT

    E-Print Network [OSTI]

    Portfolio Management AVAR Agency Vulnerability Assessment and Remediation CIO Chief Information Officer CISO

  8. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

    2012-01-01T23:59:59.000Z

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  9. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ...........26 List of Figures Figure 1: The Risk Management Process.......................................................................................................12 #12; 1 Overview The risk management process--of identifying, analyzing, evaluating

  10. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01T23:59:59.000Z

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  11. Assessing the Situation at El Pilar: Chronology, Survey, Conservation, and Management Planning for the 21st Century

    E-Print Network [OSTI]

    Ford, Anabel; Wernecke, Clark

    2000-01-01T23:59:59.000Z

    plan, critical to resource management, and imperative to archaeological study of the urban qualities of ancient El Pilar, the complete survey

  12. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  13. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  14. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  15. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  16. Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain Age

    E-Print Network [OSTI]

    Nagurney, Anna

    , electric power, smart grid, critical infrastructure, emergency and disaster pre- paredness, mergers for the determination of network vulnerability and robustness, since critical infrastructure networks from transportation, telecommunications, supply chains, to financial and electric power ones, provide the ties

  17. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Hay, David

    Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks Pankaj K. Agarwal, swami}@cs.arizona.edu Electrical Engineering, Columbia University. {hdavid, gil}@ee.columbia.edu Abstract--Telecommunications networks heavily rely on the physical infrastructure and, are therefore

  18. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  19. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01T23:59:59.000Z

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  20. Implementation of the National Incident Management System (NIMS)/Incident Command System (ICS) in the Federal Radiological Monitoring and Assessment Center(FRMAC) - Emergency Phase

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2007-04-01T23:59:59.000Z

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, including acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS/ICS construct and Unified Command (UC) for management of a domestic incident. The NRP Nuclear/Radiological Incident Annex (NUC) further provides requirements and protocols for coordinating federal government capabilities to respond to nuclear/radiological Incidents of National Significance (INS) and other radiological incidents. When a FRMAC is established, it operates under the parameters of NIMS as defined in the NRP. FRMAC and its operations have been modified to reflect NIMS/ICS concepts and principles and to facilitate working in a Unified Command structure. FRMAC is established at or near the scene of the incident to coordinate radiological monitoring and assessment and is established in coordination with the U.S. Department of Homeland Security (DHS); the coordinating agency; other federal agencies; and state, local, and tribal authorities. However, regardless of the coordinating agency designation, U.S. Department of Energy (DOE) coordinates radiological monitoring and assessment activities for the initial phases of the offsite federal incident response through the Radiological Assistance Program (RAP) and FRMAC assets. Monitoring and assessment data are managed by FRMAC in an accountable, secure, and retrievable format. Monitoring data interpretations, including exposure rate contours, dose projections, and any requested radiological assessments are to be provided to the DHS; to the coordinating agency; and to state, local, and tribal government agencies.

  1. Hawaii demand-side management resource assessment. Final report, Reference Volume 3 -- Residential and commercial sector DSM analyses: Detailed results from the DBEDT DSM assessment model; Part 1, Technical potential

    SciTech Connect (OSTI)

    NONE

    1995-04-01T23:59:59.000Z

    The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. Numerous tables and figures illustrating the technical potential for demand-side management are included.

  2. Farm Assessment for Water Resource Protection Field Assessment

    E-Print Network [OSTI]

    Holland, Jeffrey

    : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Action plan to improve field management practices . . . . . . . . . . . . . . . . . . . . . . . 21 as areas adjacent to your fields that may be vulnerable to contamination from agricultural activities connect you with a variety of resources and actions that are based on good science and field tested best

  3. Assessment of trace metals during episodic events using DGT passive sampler: A proposal for water management enhancement

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    disturbance (dredging) and provide proposal for a better water management. The results indicate that: (1) DGT is the lack of reliable and low-cost water quality sensors for continuous monitoring (Aisopou et al. 2012

  4. Software Quality Assurance Plan for GoldSim Models Supporting the Area 3 and Area 5 Radioactive Waste Management Sites Performance Assessment Program

    SciTech Connect (OSTI)

    Gregory J. Shott, Vefa Yucel

    2007-01-03T23:59:59.000Z

    This Software Quality Assurance Plan (SQAP) applies to the development and maintenance of GoldSim models supporting the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) performance assessments (PAs) and composite analyses (CAs). Two PA models have been approved by the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) as of November 2006 for the PA maintenance work undertaken by National Security Technologies, LLC (NSTec). NNSA/NSO asked NSTec to assume the custodianship of the models for future development and maintenance. The models were initially developed by Neptune and Company (N&C).

  5. Result Summary for the Area 5 Radioactive Waste Management Site Performance Assessment Model Version 4.110

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2011-07-20T23:59:59.000Z

    Results for Version 4.110 of the Area 5 Radioactive Waste Management Site (RWMS) performance assessment (PA) model are summarized. Version 4.110 includes the fiscal year (FY) 2010 inventory estimate, including a future inventory estimate. Version 4.110 was implemented in GoldSim 10.11(SP4). The following changes have been implemented since the last baseline model, Version 4.105: (1) Updated the inventory and disposal unit configurations with data through the end of FY 2010. (1) Implemented Federal Guidance Report 13 Supplemental CD dose conversion factors (U.S. Environmental Protection Agency, 1999). Version 4.110 PA results comply with air pathway and all-pathways annual total effective dose (TED) performance objectives (Tables 2 and 3, Figures 1 and 2). Air pathways results decrease moderately for all scenarios. The time of the maximum for the air pathway open rangeland scenario shifts from 1,000 to 100 years (y). All-pathways annual TED increases for all scenarios except the resident scenario. The maximum member of public all-pathways dose occurs at 1,000 y for the resident farmer scenario. The resident farmer dose was predominantly due to technetium-99 (Tc-99) (82 percent) and lead-210 (Pb-210) (13 percent). Pb-210 present at 1,000 y is produced predominantly by radioactive decay of uranium-234 (U-234) present at the time of disposal. All results for the postdrilling and intruder-agriculture scenarios comply with the performance objectives (Tables 4 and 5, Figures 3 and 4). The postdrilling intruder results are similar to Version 4.105 results. The intruder-agriculture results are similar to Version 4.105, except for the Pit 6 Radium Disposal Unit (RaDU). The intruder-agriculture result for the Shallow Land Burial (SLB) disposal units is a significant fraction of the performance objective and exceeds the performance objective at the 95th percentile. The intruder-agriculture dose is due predominantly to Tc-99 (75 percent) and U-238 (9.5 percent). The acute intruder scenario results comply with all performance objectives (Tables 6 and 7, Figures 5 and 6). The acute construction result for the SLB disposal units decreases significantly with this version. The maximum acute intruder dose occurs at 1,000 y for the SLB disposal units under the acute construction scenario. The acute intruder dose is caused by multiple radionuclides including U-238 (31 percent), Th-229 (28 percent), plutonium-239 (8.6 percent), U-233 (7.8 percent), and U-234 (6.7 percent). All results for radon-222 (Rn-222) flux density comply with the performance objective (Table 8, Figure 7). The mean Pit 13 RaDU flux density is close to the 0.74 Bq m{sup -2} s{sup -1} limit.

  6. Development of a Software SecurityAssessment Instrument to Reduce Software SecurityRisk

    E-Print Network [OSTI]

    Bishop, Matt

    system, has vulnerabilities. (SAT) for use in the software development and maintenance life cycle throughout the sofhvare development and maintenance life cycle. The. security assessment instrument includes security assessment for use in the software development and maintenance life cycle. Currently

  7. Seismic Risk Assessment of Port Facilities Ung Jin Na, Samit Ray Chaudhuri

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Seismic Risk Assessment of Port Facilities Ung Jin Na, Samit Ray Chaudhuri Faculty Advisor : Prof Estimation Methodology Applications (in progress) Port of Long Beach · Seismic Risk Assessment, Decision & Vertical movement, Settlement of Apron Seismic Vulnerability - quay Wall

  8. Assessment of contrast enhanced respiration managed cone-beam CT for image guided radiotherapy of intrahepatic tumors

    SciTech Connect (OSTI)

    Jensen, Nikolaj K. G., E-mail: nkyj@regionsjaelland.dk [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada)] [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada); Stewart, Errol [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada) [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada); Imaging Research Lab, Robarts Research Institute, London, Ontario N6A 5B7 (Canada); Imaging Program, Lawson Health Research Institute, London, Ontario N6C 2R5 (Canada); Lock, Michael; Fisher, Barbara [Radiation Oncology, London Regional Cancer Program, London, Ontario N6A3K7 (Canada) [Radiation Oncology, London Regional Cancer Program, London, Ontario N6A3K7 (Canada); Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 (Canada); Kozak, Roman [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada)] [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada); Chen, Jeff [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada) [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada); Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 (Canada); Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 (Canada); Lee, Ting-Yim [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada) [Radiology, St. Joseph's Health Care, London, Ontario N6A 4V2 (Canada); Imaging Research Lab, Robarts Research Institute, London, Ontario N6A 5B7 (Canada); Imaging Program, Lawson Health Research Institute, London, Ontario N6C 2R5 (Canada); Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 (Canada); Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 (Canada); Wong, Eugene [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada) [Physics and Engineering, London Regional Cancer Program, London, Ontario N6A3K7 (Canada); Department of Oncology, University of Western Ontario, London, Ontario N6A 4L6 (Canada); Department of Medical Biophysics, University of Western Ontario, London, Ontario N6A 5C1 (Canada); Department of Physics and Astronomy, University of Western Ontario, London, Ontario N6A 3K7 (Canada)

    2014-05-15T23:59:59.000Z

    Purpose: Contrast enhancement and respiration management are widely used during image acquisition for radiotherapy treatment planning of liver tumors along with respiration management at the treatment unit. However, neither respiration management nor intravenous contrast is commonly used during cone-beam CT (CBCT) image acquisition for alignment prior to radiotherapy. In this study, the authors investigate the potential gains of injecting an iodinated contrast agent in combination with respiration management during CBCT acquisition for liver tumor radiotherapy. Methods: Five rabbits with implanted liver tumors were subjected to CBCT with and without motion management and contrast injection. The acquired CBCT images were registered to the planning CT to determine alignment accuracy and dosimetric impact. The authors developed a simulation tool for simulating contrast-enhanced CBCT images from dynamic contrast enhanced CT imaging (DCE-CT) to determine optimal contrast injection protocols. The tool was validated against contrast-enhanced CBCT of the rabbit subjects and was used for five human patients diagnosed with hepatocellular carcinoma. Results: In the rabbit experiment, when neither motion management nor contrast was used, tumor centroid misalignment between planning image and CBCT was 9.2 mm. This was reduced to 2.8?mm when both techniques were employed. Tumors were not visualized in clinical CBCT images of human subjects. Simulated contrast-enhanced CBCT was found to improve tumor contrast in all subjects. Different patients were found to require different contrast injections to maximize tumor contrast. Conclusions: Based on the authors’ animal study, respiration managed contrast enhanced CBCT improves IGRT significantly. Contrast enhanced CBCT benefits from patient specific tracer kinetics determined from DCE-CT.

  9. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30T23:59:59.000Z

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  10. Notice of Intent to Revise DOE G 414.1-1B, Management and Independent Assessments Guide for Use with 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-04-18T23:59:59.000Z

    This memorandum provides justification for revising DOE G 414.1-1B, Management and Independent Assessments Guide for Use With 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated Safety Management System Manual; and DOE O 226.1A, Implementation of Department of Energy Oversight Policy.

  11. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  12. Global MSW Generation in 2007 estimated at two billion tons Global Waste Management Market Assessment 2007, Key Note Publications Ltd ,

    E-Print Network [OSTI]

    Columbia University

    analyses the global waste market, with particular reference to municipal solid waste (MSW). Key NoteGlobal MSW Generation in 2007 estimated at two billion tons Global Waste Management Market between growth in wealth and increase in waste -- the more affluent a society becomes, the more waste

  13. Nonproliferation impacts assessment for the management of the Savannah River Site aluminum-based spent nuclear fuel

    SciTech Connect (OSTI)

    NONE

    1998-12-01T23:59:59.000Z

    On May 13, 1996, the US established a new, 10-year policy to accept and manage foreign research reactor spent nuclear fuel containing uranium enriched in the US. The goal of this policy is to reduce civilian commerce in weapons-usable highly enriched uranium (HEU), thereby reducing the risk of nuclear weapons proliferation. Two key disposition options under consideration for managing this fuel include conventional reprocessing and new treatment and packaging technologies. The Record of Decision specified that, while evaluating the reprocessing option, ``DOE will commission or conduct an independent study of the nonproliferation and other (e.g., cost and timing) implications of chemical separation of spent nuclear fuel from foreign research reactors.`` DOE`s Office of Arms Control and Nonproliferation conducted this study consistent with the aforementioned Record of Decision. This report addresses the nonproliferation implications of the technologies under consideration for managing aluminum-based spent nuclear fuel at the Savannah River Site. Because the same technology options are being considered for the foreign research reactor and the other aluminum-based spent nuclear fuels discussed in Section ES.1, this report addresses the nonproliferation implications of managing all the Savannah River Site aluminum-based spent nuclear fuel, not just the foreign research reactor spent nuclear fuel. The combination of the environmental impact information contained in the draft EIS, public comment in response to the draft EIS, and the nonproliferation information contained in this report will enable the Department to make a sound decision regarding how to manage all aluminum-based spent nuclear fuel at the Savannah River Site.

  14. T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability |PROBLEM:

  15. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergyDepartment

  16. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java Runtime...

  17. A total risk assessment methodology for security assessment.

    SciTech Connect (OSTI)

    Aguilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

    2009-06-01T23:59:59.000Z

    Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a small comparable target cohort group) is more likely to choose to attack the specific target under analysis because he perceives it to be a relatively unique attack opportunity. The opposite is also true. Thus, total risk is related to the number of targets that exist in each scenario cohort group. This paper describes the Total Risk Assessment Methodology and illustrates it through an example.

  18. Material stabilization characterization management plan

    SciTech Connect (OSTI)

    GIBSON, M.W.

    1999-08-31T23:59:59.000Z

    This document presents overall direction for characterization needs during stabilization of SNM at the Plutonium Finishing Plant (PFP). Technical issues for needed data and equipment are identified. Information on material categories and links to vulnerabilities are given. Comparison data on the material categories is discussed to assist in assessing the relative risks and desired processing priority.

  19. Assessment of managed aquifer recharge site suitability and influence using a GIS and3 numerical modeling4

    E-Print Network [OSTI]

    Fisher, Andrew

    " for20 MAR. Results from the GIS analysis were used with a regional groundwater model to assess the groundwater flowing to the ocean over the long term. Modeling results28 illustrate considerable variability evaluation of options for32 enhancing groundwater resources.33 34 1. Introduction35 Groundwater

  20. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01T23:59:59.000Z

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  1. INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER AND WASTEWATER AT THE SEPARATIONS PROCESS RESEARCH UNIT (SPRU) DISPOSITION PROJECT, NEW YORK

    SciTech Connect (OSTI)

    Abitz, R.; Jackson, D.; Eddy-Dilek, C.

    2011-06-27T23:59:59.000Z

    The U.S. Department of Energy (DOE) is currently evaluating the water management procedures at the Separations Process Research Unit (SPRU). The facility has three issues related to water management that require technical assistance: (1) due to a excessive rainfall event in October, 2010, contaminated water collected in basements of G2 and H2 buildings. As a result of this event, the contractor has had to collect and dispose of water offsite; (2) The failure of a sump pump at a KAPL outfall resulted in a Notice of Violation issued by the New York State Department of Environment and Conservation (NYSDEC) and subsequent Consent Order. On-site water now requires treatment and off-site disposition; and (3) stormwater infiltration has resulted in Strontium-90 levels discharged to the storm drains that exceed NR standards. The contractor has indicated that water management at SPRU requires major staff resources (at least 50 persons). The purpose of this review is to determine if the contractor's technical approach warrants the large number of staff resources and to ensure that the technical approach is compliant and in accordance with federal, state and NR requirements.

  2. Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability 

    E-Print Network [OSTI]

    Crossley, Janet Ruth

    2008-01-01T23:59:59.000Z

    needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

  3. DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ

    E-Print Network [OSTI]

    Smith, Sean W.

    Chapter 1 DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ Rebecca Shapiro, Sergey Bratus, for SCADA software used in critical infrastructure, the widespread use of propri- etary protocols makes't apply in real-world infrastructure such as power SCADA. Domain experts often do not have the time

  4. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  5. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  6. Vulnerability of Hydropower Projects to Climate Change Revision: 20th

    E-Print Network [OSTI]

    Harrison, Gareth

    Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

  7. Cyber-Vulnerability of Power Grid Monitoring and Control Systems

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber-Vulnerability of Power Grid Monitoring and Control Systems Chee-Wooi Ten Iowa State, and power infrastructures due to the complexity of required compliances [5]. Although the complex outages. Three modes of malicious attacks on the power infrastructure are (i) attack upon the system, (ii

  8. Vulnerability Analysis of Complex Networks from Transportation Networks to

    E-Print Network [OSTI]

    Nagurney, Anna

    and Electric Power Supply Chains Anna Nagurney John F. Smith Memorial Professor Department of Finance to Dynamic Networks · Where Are We Now? An Empirical Case Study to Real-World Electric Power Supply ChainsVulnerability Analysis of Complex Networks from Transportation Networks to the Internet

  9. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01T23:59:59.000Z

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  10. Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability

    E-Print Network [OSTI]

    Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

  11. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

  12. eBird: Assessing the Application of Large Scale Citizen Science Data and Data Collection Strategies for Local Management Use

    E-Print Network [OSTI]

    Riddle, Thomas Carroll 1984-

    2012-11-13T23:59:59.000Z

    to my committee member Dr. Sam Brody for putting up with me amongst all of his other students. Thanks go out to the GR2R group and members of the new ICOM Lab. Their help and support is what made this possible. Special thanks to my colleagues Sarah... wishes to open a new sanctuary for Piping Plovers. Three sites are marked by USFWS as critical habit in the area. The manager wishes to protect the site that is found to have the largest number of Piping Plovers. This study uses this scenario to find...

  13. Attachment J-16 Portfolio Management Task Order 13-002 Title: DOE-HQ Security System Review and Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational ManagementDemand6 Department of

  14. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  15. A case study of social vulnerability mapping: issues of scale and aggregation

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15T23:59:59.000Z

    This study uses geographic information systems to determine if the aggregation of census block data are better than census block group data for analyzing social vulnerability. This was done by applying a social vulnerability method that used census...

  16. A strategic analysis study-based approach to integrated risk assessment: Occupational health risks from environmental restoration and waste management activities at Hanford

    SciTech Connect (OSTI)

    Mahaffey, J.A.; Doctor, P.G.; Buschbom, R.L.; Glantz, C.S.; Daling, P.M.; Sever, L.E.; Vargo, G.J. Jr.; Strachan, D.M. [Pacific Northwest Lab., Richland, WA (United States); Pajunen, A.L.; Hoyt, R.C.; Ludowise, J.D. [Westinghouse Hanford Co., Richland, WA (United States)

    1993-06-01T23:59:59.000Z

    The goal of environmental restoration and waste management activities is to reduce public health risks or to delay risks to the future when new technology will be available for improved cleanup solutions. Actions to remediate the wastes on the Hanford Site will entail risks to workers, the public, and the environment that do not currently exist. In some circumstances, remediation activities will create new exposure pathways that are not present without cleanup activities. In addition, cleanup actions will redistribute existing health risks over time and space, and will likely shift health risks to cleanup workers in the short term. This report describes an approach to occupational risk assessment based on the Hanford Strategic Analysis Study and illustrates the approach by comparing worker risks for two options for remediation of N/K fuels, a subcategory of unprocessed irradiated fuels at Hanford.

  17. Comparative assessment of municipal sewage sludge incineration, gasification and pyrolysis for a sustainable sludge-to-energy management in Greece

    SciTech Connect (OSTI)

    Samolada, M.C. [Dept. Secretariat of Environmental and Urban Planning – Decentralized Area Macedonian Thrace, Taki Oikonomidi 1, 54008 Thessaloniki (Greece); Zabaniotou, A.A., E-mail: azampani@auth.gr [Aristotle University of Thessaloniki, Dept. of Chemical Engineering, University Box 455, University Campus, 541 24 Thessaloniki (Greece)

    2014-02-15T23:59:59.000Z

    Highlights: • The high output of MSS highlights the need for alternative routes of valorization. • Evaluation of 3 sludge-to-energy valorisation methods through SWOT analysis. • Pyrolysis is an energy and material recovery process resulting to ‘zero waste’. • Identification of challenges and barriers for MSS pyrolysis in Greece was investigated. • Adopters of pyrolysis systems face the challenge of finding new product markets. - Abstract: For a sustainable municipal sewage sludge management, not only the available technology, but also other parameters, such as policy regulations and socio-economic issues should be taken in account. In this study, the current status of both European and Greek Legislation on waste management, with a special insight in municipal sewage sludge, is presented. A SWOT analysis was further developed for comparison of pyrolysis with incineration and gasification and results are presented. Pyrolysis seems to be the optimal thermochemical treatment option compared to incineration and gasification. Sewage sludge pyrolysis is favorable for energy savings, material recovery and high added materials production, providing a ‘zero waste’ solution. Finally, identification of challenges and barriers for sewage sludge pyrolysis deployment in Greece was investigated.

  18. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  19. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  20. Assessment of Safety Culture at the U.S. Departmen to Energy Office of Environmental Management Headquarters, November 2012

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureComments from Tarasa U.S.LLC |AquionMr.August Contract No.|andAssessment

  1. Private Lands, Public Goods: Engaging Landowners in Ecosystem Management

    E-Print Network [OSTI]

    Ferranto, Shasta Patricia

    2012-01-01T23:59:59.000Z

    practice: implementing ecosystem management objectives in2009. Science for managing ecosystem services: Beyondthe Millennium Ecosystem Assessment. Proceedings of the

  2. Environmental Assessment for the construction and operation of the Three Rivers Solid Waste Authority regional waste management center at the Savannah River Site

    SciTech Connect (OSTI)

    NONE

    1995-12-01T23:59:59.000Z

    This Environmental Assessment (EA) has been prepared by the US Department of Energy (DOE) to assess the potential environmental impacts associated with the construction and operation of a landfill and technology center for regionally-generated municipal solid waste at the Savannah River Site (SRS) near Aiken, South Carolina. The facility would serve the municipal solid waste disposal needs for SRS and at least nine of the surrounding counties who currently comprise the Three Rivers Solid Waste Authority (TRSWA). Additional counties could become included in the proposed action at some future date. Current Federal and state requirements do not afford individual counties and municipalities within the region encompassing SRS the ability to efficiently or economically operate modern waste management facilities. In addition, consolidation of regional municipal solid waste at one location would have the benefit of reducing the duplicity of environmental consequences associated with the construction and operation of county-level facilities. The option to seek a combined disposal and technology development facility based on a regionally-cooperative effort was selected as a viable alternative to the existing individual SRS or county disposal activities. This document was prepared in compliance with the National Environmental Policy Act (NEPA) of 1969, as amended, the requirements of the Council on Environmental Quality Regulations for Implementing NEPA (40 CFR Part 1021). NEPA requires the assessment of environmental consequences of Federal actions that may affect the quality of the human environment. Based on the potential for impacts described for impacts described herein, DOE will either publish a Finding of No Significant Impact or prepare an environmental impact statement (EIS).

  3. DOE's Environmental Management Site-Specific Advisory Board: The Roles, Work, and Assessment of the Constituent Local Boards - 13587

    SciTech Connect (OSTI)

    Alexander, Catherine [U.S. Dept. of Energy, Office of Environmental Management, Office of Intergovernmental and Community Activities, 1000 Independence Avenue, S.W.,Washington, D.C. 20585 (United States)] [U.S. Dept. of Energy, Office of Environmental Management, Office of Intergovernmental and Community Activities, 1000 Independence Avenue, S.W.,Washington, D.C. 20585 (United States); Freeman, Jenny [Strata-G, LLC, 2027 Castaic Lane, Knoxville, TN 37932 (United States)] [Strata-G, LLC, 2027 Castaic Lane, Knoxville, TN 37932 (United States); Cantrell, Yvette [Restoration Services, Inc., 136 Mitchell Road, Oak Ridge, TN 37830 (United States)] [Restoration Services, Inc., 136 Mitchell Road, Oak Ridge, TN 37830 (United States)

    2013-07-01T23:59:59.000Z

    The charter for the Department of Energy's Environmental Management (EM) Site-Specific Advisory Board (SSAB) was approved under the Federal Advisory Committee Act (FACA) in 1994. With a unique mandate to provide public input on issues associated with the cleanup of nuclear legacy sites in the U.S., the EM SSAB comprises eight local boards, which are based at major EM sites. While each board is unique to the community in which it is located and reflects the diversity of the local population, the boards are governed by FACA, related regulations, and DOE policies that are intended to standardize agency advisory board operations. The EM SSAB local boards are made up of a diverse group of citizens who want to understand the mission and goals of the EM program and to help EM achieve those goals for the benefit of their communities. Some are quite passionate about their mission; others need to be coaxed into active participation. Maintaining productive relationships and a supportive environment for effective board operations is the challenge of board management for DOE EM and the board members themselves. DOE draws on research findings and best practices literature from academics and practitioners in the field of public involvement in its board management practices. The EM SSAB is also evaluated annually under the law to ensure that the investment of taxpayer dollars in the board is warranted in light of the contributions of the board. Further evaluation takes place at the agency and site levels in order to identify what aspects of board functioning the agency and board members find important to its success and to address areas where improvement is needed. Board contributions, compliance factors, and measurable outcomes related to board products and process areas are key to agency commitment to ongoing support of the boards and to participant satisfaction and thus continued member involvement. In addition to evaluation of these factors in improving board effectiveness, the agency draws on the experience of members to create best practices for the EM SSAB, as a unique form of public involvement. Four areas that have been identified by local board Chairpersons as important to their local board operations are - Enhancing communication between technical and non-technical board members; - Building on common ground toward recommendations; - Public involvement in EM SSAB local board activities; - The EM SSAB annual work plan process. The first three areas are addressed below by current or former chairpersons of the EM SSAB: Ralph Phelps, former Chairperson of the Northern New Mexico Citizens' Advisory Board; Susan Leckband, former Chairperson and current Vice Chairperson of the Hanford Advisory Board; and Val Francis, Vice Chairperson of the Portsmouth (PORTS) SSAB. In addition, Eric Roberts, facilitator of the PORTS SSAB, has contributed to the section on public involvement. In a separate paper for this session, Ralph Young, Chairperson of the Paducah Citizens' Advisory Board addresses the EM SSAB annual work plan process. (authors)

  4. assessment intervention program: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Human Resource Management (HRM) specialization started as a new IN MANAGEMENT - HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN (REV. 22710) MissionVision Statement...

  5. assessment program emap: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Human Resource Management (HRM) specialization started as a new IN MANAGEMENT - HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN (REV. 22710) MissionVision Statement...

  6. assessment program fiscal: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Human Resource Management (HRM) specialization started as a new IN MANAGEMENT - HUMAN RESOURCE MANAGEMENT SPECIALIZATION ASSESSMENT PLAN (REV. 22710) MissionVision Statement...

  7. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  8. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  9. Zajac, R.N. 1999. Understanding the seafloor landscape in relation to assessing and managing impacts on coastal environments. Pp 211-227 in: J.S. Gray, W. Ambrose Jr., A. Szaniawska (eds) Biogeochemical Cycling and Sediment

    E-Print Network [OSTI]

    Zajac, Roman N.

    of organisms, and have borne much of man's long history of development and associated environmental impacts IN RELATION TO IMPACT ASSESSMENT AND ENVIRONMENTAL MANAGEMENT IN COASTAL MARINE SEDIMENTS ROMAN N. ZAJAC impacts on coastal environments. Pp 211-227 in: J.S. Gray, W. Ambrose Jr., A. Szaniawska (eds

  10. accident management guidance: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    React to Public Earnings Guidance investigates security analysts' reactions to public management guidance and assesses whether managers management provides public guidance....

  11. T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

  12. Environmental Assessment and Finding of No Significant Impact: Interim Measures for the Mixed Waste Management Facility Groundwater at the Burial Ground Complex at the Savannah River Site

    SciTech Connect (OSTI)

    N /A

    1999-12-08T23:59:59.000Z

    The U. S. Department of Energy (DOE) prepared this environmental assessment (EA) to analyze the potential environmental impacts associated with the proposed interim measures for the Mixed Waste Management Facility (MW) groundwater at the Burial Ground Complex (BGC) at the Savannah River Site (SRS), located near Aiken, South Carolina. DOE proposes to install a small metal sheet pile dam to impound water around and over the BGC groundwater seepline. In addition, a drip irrigation system would be installed. Interim measures will also address the reduction of volatile organic compounds (VOCS) from ''hot-spot'' regions associated with the Southwest Plume Area (SWPA). This action is taken as an interim measure for the MWMF in cooperation with the South Carolina Department of Health and Environmental Control (SCDHEC) to reduce the amount of tritium seeping from the BGC southwest groundwater plume. The proposed action of this EA is being planned and would be implemented concurrent with a groundwater corrective action program under the Resource Conservation and Recovery Act (RCRA). On September 30, 1999, SCDHEC issued a modification to the SRS RCRA Part B permit that adds corrective action requirements for four plumes that are currently emanating from the BGC. One of those plumes is the southwest plume. The RCRA permit requires SRS to submit a corrective action plan (CAP) for the southwest plume by March 2000. The permit requires that the initial phase of the CAP prescribe a remedy that achieves a 70-percent reduction in the annual amount of tritium being released from the southwest plume area to Fourmile Branch, a nearby stream. Approval and actual implementation of the corrective measure in that CAP may take several years. As an interim measure, the actions described in this EA would manage the release of tritium from the southwest plume area until the final actions under the CAP can be implemented. This proposed action is expected to reduce the release of tritium from the southwest plume area to Fourmile Branch between 25 to 35 percent. If this proposed action is undertaken and its effectiveness is demonstrated, it may become a component of the final action in the CAP. This document was prepared in compliance with the National Environmental Policy Act (NEPA) of 1969, as amended; the requirements of the Council on Environmental Quality Regulations for Implementing NEPA (40 CFR 1500-1508); and the DOE Regulations for Implementing NEPA (10 CFR 1021). NEPA requires the assessment of environmental consequences of Federal actions that may affect the quality of the human environment. Based on the potential for impacts described herein, DOE will either publish a Finding of No Significant Impact (FONSI) or prepare an environmental impact statement (EM).

  13. Geologic mapping for groundwater resource protection and assessment

    SciTech Connect (OSTI)

    Shafer, J.M. (Univ. of South Carolina, Columbia, SC (United States). Earth Sciences and Resources Inst.); Berg, R.C. (Illinois State Geological Survey, Champaign, IL (United States))

    1993-03-01T23:59:59.000Z

    Groundwater is a vital natural resource in the US and around the world. In order to manage and protect this often threatened resource one must better understand its occurrence, extent, and susceptibility to contamination. Geologic mapping is a fundamental approach to developing more detailed and accurate assessments of groundwater resources. The stratigraphy and lithology of earth materials provide the framework for groundwater systems, whether they are deep confined aquifers or shallow, water table environments. These same earth materials control, in large part, the rates of migration of water and contaminants into and through groundwater systems thus establishing the potential yields of the systems and their vulnerability to contamination. Geologic mapping is used to delineate and display the vertical sequencing of earth materials either in cross-section or over lateral areas as in the stack-unit geologic map. These geologic maps, along with supportive hydrogeologic information, are used to identify the three-dimensional positioning and continuity of aquifer and non-aquifer earth materials. For example, detailed stack-unit mapping to a depth of 30 meters has been completed for a portion of a northern Illinois county. Groundwater contamination potentials were assigned to various vertical sequences of materials. Where aquifers are unconfined, groundwater contamination potentials are greatest. Conversely, other considerations being equal, the thicker the confining unit, the lower the contamination potential. This information is invaluable for land use decision-making; water supply assessment, development, and management; and environmental protection planning.

  14. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01T23:59:59.000Z

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  15. A Roadmap to Risk-Aware Business Process Management

    E-Print Network [OSTI]

    that resources are utilized as efficient as possible and services are managed in an effective way. From vulnerabilities [11][12]. The introduced model consists of four interconnected layers: (1) Business process layerA Roadmap to Risk-Aware Business Process Management Stefan Jakoubi, Thomas Neubauer Secure Business

  16. EV Guideline Assessment Templates | Department of Energy

    Energy Savers [EERE]

    EV Guideline Assessment Templates More Documents & Publications EV Guideline Assessment Templates NDIAPMSCEVMSIntentGuideNov2006.pdf Earned Value Management System RM...

  17. Federal Radiological Monitoring and Assessment Center | National...

    National Nuclear Security Administration (NNSA)

    Mission The mission of the FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment Federal Radiological Monitoring and Assessment...

  18. Joint environmental assessment 1997--2001 of the California Department of Food and Agriculture Curly Top Virus Control Program for Bureau of Land Management and Department of Energy

    SciTech Connect (OSTI)

    NONE

    1997-03-01T23:59:59.000Z

    The DOE, Naval Petroleum reserves in California (NPRC), proposes to sign an Amendment to the Cooperative Agreement and Supplement with the California Department of Food and Agriculture (CDFA) to extend the term of the Curly Top Virus Control Program (CTVCP) in California. This program involves Malathion spraying on NPRC lands to control the beet leafhopper, over a five year period from 1997 through 2001. It is expected that approximately 330 acres on Naval Petroleum Reserve Number 1 (NPR-1) and approximately 9,603 acres on Naval Petroleum Reserve Number 2 (NPR-2) will be treated with Malathion annually by CDFA during the course of this program. The actual acreage subject to treatment can vary from year to year. Pursuant to the requirements of the National Environmental Policy Act of 1969 (NEPA), as amended, the potential impacts of the proposed action were analyzed in a Joint Environmental Assessment (DOE/EA-1011) with the US Department of Interior, Bureau of Land Management (BLM) acting as lead agency, in consultation with the CDFA, and the DOE acting as a cooperating agency. Based on the analysis in the EA, DOE has determined that the conduct of the Curly Top Virus Control Program in California is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the NEPA. Therefore, the preparation of an Environmental Impact Statement is not required and DOE is consequently issuing a FONSI.

  19. 4-Poster Tick Management and White-tailed Deer Management

    E-Print Network [OSTI]

    Homes, Christopher C.

    the methodologies for Integrated Wildlife Damage Management approach #12;Environmental Assessment Purpose and NeedUpdate on: 4-Poster Tick Management and White-tailed Deer Management Tim Green Environmental been on hold until present #12;Environmental Assessment Current Status: · Adopting two existing EAs - U

  20. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19T23:59:59.000Z

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  1. V-062: Asterisk Two Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote

  2. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment of

  3. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartmentWireshark

  4. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities | DepartmentEnergy

  5. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |Department of

  6. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery

  7. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment of

  8. Predicting the probability of elevated nitrate concentrations in the Puget Sound Basin: Implications for aquifer susceptibility and vulnerability

    SciTech Connect (OSTI)

    Tesoriero, A.J.; Voss, F.D. [Geological Survey, Tacoma, WA (United States). Water Resources Div.

    1997-11-01T23:59:59.000Z

    The occurrence and distribution of elevated nitrate concentrations in ground water in the Puget Sound Basin, Washington, were determined by examining existing data from more than 3,000 wells. Models that estimate the probability that a well has an elevated nitrate concentration were constructed by relating the occurrence of elevated nitrate concentrations to both natural and anthropogenic variables using logistic regression. The variables that best explain the occurrence of elevated nitrate concentrations were well depth, surficial geology, and the percentage of urban and agricultural land within a radius of 3.2 kilometers of the well. From these relations, logistic regression models were developed to assess aquifer susceptibility and ground-water vulnerability. Both models performed well at predicting the probability of elevated nitrate concentrations in an independent data set. This approach to assessing aquifer susceptibility and ground-water vulnerability has the advantages of having both model variables and coefficient values determined on the basis of existing water quality information and does not depend on the assignment of variables and weighting factors based on qualitative criteria.

  9. Climate change and climate variability affect all regions of the world. U.S. vulnerability to the changes and variations are not only dependent on changes within the U.S. but also on

    E-Print Network [OSTI]

    OVERVIEW Climate change and climate variability affect all regions of the world. U.S. vulnerability, it is important to assess emerging threats to national security due to climate change far into the future. Having with national security establish practical responses to climate change and extreme weather events

  10. Management Plan Management Plan

    E-Print Network [OSTI]

    Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids

  11. NASA Benchmarks Safety Functions Assessment plan - Developed...

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY FUNCTIONS Assessment Plan Developed By NNSANevada Site Office Facility Representative Division Performance Objective: Management should be proactive in addressing...

  12. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  13. Vulnerability of nuclear power plant structures to large external fires

    SciTech Connect (OSTI)

    Bennett, D.E.

    1983-08-01T23:59:59.000Z

    This report examines the inherent vulnerability of nuclear power plant structures to the thermal environments arising from large, external fires. The inherent vulnerability is the capacity of the concrete safety-related structures to absorb thermal loads without exceeding the appropriate thermal and structural design criteria. The potential sources of these thermal environments are large, offsite fires arising from accidents involving the transportation or storage of large quantities of flammable gases or liquids. A realistic thermal response analysis of a concrete panel was performed using three limiting criteria: temperature at the first rebar location, erosion and ablation of the front (exterior) surface due to high heat fluxes, and temperature at the back (interior) surface. The results of this analysis yield a relationship between incident heat flux and the maximum allowable exposure duration. Example calculations for the break of a 0.91 m (3') diameter high-pressure natural gas pipeline and a 1 m/sup 2/ hole in a 2-1/2 million gallon gasoline tank show that the resulting fires do not pose a significant hazard for ranges of 500 m or greater.

  14. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  15. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  16. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  17. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  19. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  20. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  1. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  2. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  3. Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion

    SciTech Connect (OSTI)

    Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

    2010-05-21T23:59:59.000Z

    In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

  4. GARS ESH Management Review GARS Research Operations

    E-Print Network [OSTI]

    Ohta, Shigemi

    Assessment March 2013 No Findings Records Management April 2013 Lab Level OFI ­ identification & inventoryGARS ESH Management Review GARS Research Operations December 11, 2013 #12;GARS FY13 ESH Management Review ­ Slide 2 Management Review Scope Senior Management shall review the EMS and OSH Management

  5. 2012 Annual Planning Summary for Legacy Management

    Broader source: Energy.gov [DOE]

    The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2012 and 2013 within Legacy Management.

  6. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  7. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  8. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT January 2008 OFFICE OF UNIVERSITY RISK MANAGEMENT CP-320 714-278-7346 #12;2006 ­ 2007 Risk Management Annual Report Page 2 I. Executive Summary A. Program Cost One method to assess the effectiveness of the University's risk management

  9. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT ANNUAL REPORT November 2006 OFFICE OF UNIVERSITY RISK MANAGEMENT LH-806C 714-278-7346 #12;2005 ­ 2006 Risk Management Annual Report Page 2 I. Executive Summary A. Program Cost One method to assess the effectiveness of the University's risk management

  10. Assessing the assessments: Pharmaceuticals in the environment

    SciTech Connect (OSTI)

    Enick, O.V. [Department of Biological Sciences, Simon Fraser University, Burnaby, BC, V5A 1S6 (Canada)], E-mail: oana.enick@gov.bc.ca; Moore, M.M. [Department of Biological Sciences, Simon Fraser University, Burnaby, BC, V5A 1S6 (Canada)], E-mail: mmoore@sfu.ca

    2007-11-15T23:59:59.000Z

    The relatively new issue of pharmaceutical contamination of the environment offers the opportunity to explore the application of values to the construction, communication and management of risk. The still-developing regulatory policies regarding environmental contamination with pharmaceuticals provide fertile ground for the introduction of values into the definition and management of risk. In this report, we summarize the current knowledge regarding pharmaceutical contamination of the environment and discuss specific attributes of pharmaceuticals that require special consideration. We then present an analysis showing that if values are incorporated into assessing, characterizing and managing risk, the results of risk assessments will more accurately reflect the needs of various stakeholders. Originating from an acknowledgement of the inherent uncertainty and value-laden nature of risk assessment, the precautionary principle (and later, the multi-criteria, integrated risk assessment), provides a direction for further research and policy development.

  11. The Environmental Management Project Manager`s Handbook for improved project definition

    SciTech Connect (OSTI)

    NONE

    1995-02-01T23:59:59.000Z

    The United States Department of Energy (DOE) is committed to providing high quality products that satisfy customer needs and are the associated with this goal, DOE personnel must possess the knowledge, skills, and abilities to ensure successful job performance. In addition, there must be recognition that the greatest obstacle to proper project performance is inadequate project definition. Without strong project definition, DOE environmental management efforts are vulnerable to fragmented solutions, duplication of effort, and wastes resources. The primary means of ensuring environmental management projects meet cost and schedule milestones is through a structured and graded approach to project definition, which is the focus of this handbook.

  12. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  13. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  14. Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data

    E-Print Network [OSTI]

    Mitasova, Helena

    Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

  15. Impact of relief accuracy on flood simulations and road network vulnerability analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

  16. Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to

    E-Print Network [OSTI]

    Melcher, Peter

    nega- tive pressures (Dixon and Joly, 1895; Briggs, 1950) allows plants to power the movement of water to withstand tension-induced cavitation is typ- ically inferred from "vulnerability curves" generatedVulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels

  17. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  18. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  19. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  20. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  1. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui infrastructure and begins to show its inability as the demand for power delivery and consumption boosts in recent power grid. This integration, however, brings a new host of vulnerabilities stem from Internet and opens

  2. Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii

    E-Print Network [OSTI]

    Herrera, Carlos M.

    vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

  3. Seismic vulnerability analysis of moderate seismicity areas using in situ experimental

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

  4. Performing Energy Security Assessments - A How-To Guide for Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers Guide...

  5. Utility of Social Modeling for Proliferation Assessment - Preliminary Assessment

    SciTech Connect (OSTI)

    Coles, Garill A.; Gastelum, Zoe N.; Brothers, Alan J.; Thompson, Sandra E.

    2009-06-01T23:59:59.000Z

    This Preliminary Assessment draft report will present the results of a literature search and preliminary assessment of the body of research, analysis methods, models and data deemed to be relevant to the Utility of Social Modeling for Proliferation Assessment research. This report will provide: 1) a description of the problem space and the kinds of information pertinent to the problem space, 2) a discussion of key relevant or representative literature, 3) a discussion of models and modeling approaches judged to be potentially useful to the research, and 4) the next steps of this research that will be pursued based on this preliminary assessment. This draft report represents a technical deliverable for the NA-22 Simulations, Algorithms, and Modeling (SAM) program. Specifically this draft report is the Task 1 deliverable for project PL09-UtilSocial-PD06, Utility of Social Modeling for Proliferation Assessment. This project investigates non-traditional use of social and cultural information to improve nuclear proliferation assessment, including nonproliferation assessment, proliferation resistance assessments, safeguards assessments and other related studies. These assessments often use and create technical information about the State’s posture towards proliferation, the vulnerability of a nuclear energy system to an undesired event, and the effectiveness of safeguards. This project will find and fuse social and technical information by explicitly considering the role of cultural, social and behavioral factors relevant to proliferation. The aim of this research is to describe and demonstrate if and how social science modeling has utility in proliferation assessment.

  6. Abstract--In this paper, a new methodology for stability assessment of a smart power system is proposed. The key to this

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    ANY of the public infrastructures like electric power network are subject to two types of threats networks approach to electric power network security would identify key vulnerabilities, assess vulnerability of the North American power grid was studied after the August 2003 blackout affecting the United

  7. Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs

    E-Print Network [OSTI]

    Matta, Abraham "Ibrahim"

    #0205294, and EIA RI Award #0202067, and by grants from Fortress Technologies. attacks are orchestrated], [12], routing protocols [15], firewalls and traffic shapers [32], [14], HTTP and database server farms

  8. A METHOD FOR RAPID VULNERABILITY ASSESSMENT OF STRUCTURES LOADED BY OUTSIDE BLASTS

    E-Print Network [OSTI]

    Cizelj, Leon

    military threats to a nuclear power plant in the year 1991 (Stritar et al, 1991). More recent examples cases not been assumed as design basis loads of nuclear power plant buildings and structures. Recent efforts have been recently devoted to the increased security of nuclear power plants (NPP) (see

  9. Seismic Vulnerability Assessment Waste Characterization Reduction and Repackaging Building, TA-50-69

    SciTech Connect (OSTI)

    M.W.Sullivan; J.Ruminer; I.Cuesta

    2003-02-02T23:59:59.000Z

    This report presents the results of the seismic structural analyses completed on the Waste Characterization Reduction and Repackaging (WCRR) Building in support of ongoing safety analyses. WCRR is designated as TA-50-69 at Los Alamos National Laboratory, Los Alamos, New Mexico. The facility has been evaluated against Department of Energy (DOE) seismic criteria for Natural Phenomena Hazards (NPH) Performance Category II (PC 2). The seismic capacities of two subsystems within the WCRR building, the material handling glove box and the lift rack immediately adjacent to the Glove Box are also documented, and the results are presented.

  10. Simplifying the assessment of building vulnerability to chemical, biological and radiological releases

    E-Print Network [OSTI]

    Thatcher, T.L.; Wood, E.E.; Edelson, E.C.; Sextro, R.G.

    2008-01-01T23:59:59.000Z

    such as Heating, Ventilation, and Air Conditioning system (C B R agents, the Heating, Ventilation, and Air Conditioning

  11. Assessing the Vulnerability of Replicated Network George Dean Bissias, Brian Neil Levine, and Ramesh K. Sitaraman

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    , and Ramesh K. Sitaraman Dept. of Computer Science, Univ. of Massachusetts Amherst, USA {gbiss% of the substations from all generators; on a large wireless mesh network disrupting 5% of wireless links between autonomous systems (i.e., servers). In a power grid, each substation (i.e., client) connects to one

  12. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01T23:59:59.000Z

    development lifecycle (SDLC) aims to address softwareone important part of an SDLC, complemented by things likethe use of a VRP in their SDLC, guidance is limited. By

  13. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01T23:59:59.000Z

    phase of the software development lifecycle, which beginsphase of the software development lifecycle, which beginsA secure software development lifecycle (SDLC) aims to

  14. Assessment of the Potential Effect of Climate Change on Hurricane Risk and Vulnerability in Florida

    E-Print Network [OSTI]

    Ruiz, Michelle

    2014-12-05T23:59:59.000Z

    to these powerful storms. Hurricane return periods were calculated for all Florida counties based on 1900-2010. Hurricane landfalls were quantified using a dynamic wind model which allowed for the spatial extent of each storm to be examined. A meta...

  15. Northeast Climate Science Center: Transposing Extreme Rainfall to Assess Climate Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Climate models predict significant increases in the magnitude and frequency of extreme rainfalls.  However, climate model projections of precipitation vary greatly across models.  For communities...

  16. Columbia University, EE Technical Report #2008-08-26, Aug. 2008 Assessing the Vulnerability of

    E-Print Network [OSTI]

    Zussman, Gil

    disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse, Electromagnetic Pulse (EMP). I. INTRODUCTION The global communications infrastructure is primarily based on fiber by anything from Electromagnetic Pulse (EMP) attacks [14], [24] to dragging anchors [6], [27]. Such real

  17. Can leading indicators assess country vulnerability? Evidence from the 200809 global financial crisis

    E-Print Network [OSTI]

    Wolfe, Patrick J.

    , in contrast to the international debt crisis that began in Latin America in 1982 and the East Asia crisis countries were badly impacted by the global financial crisis of 2008­09. The crisis renewed interest

  18. 2008 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2009-03-30T23:59:59.000Z

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs) for each of the facilities, with the results submitted annually to U.S. Department of Energy (DOE) Headquarters. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan. The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) performed an annual review in fiscal year (FY) 2008 by evaluating operational factors and research results that impact the continuing validity of the PAs and CAs. This annual summary report presents data and conclusions from the FY 2008 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada Test Site relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs.

  19. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26T23:59:59.000Z

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  20. Certified Professional in Supply Management (CPSM) Review Series: Exam 2: Effective Supply Management Performance

    E-Print Network [OSTI]

    · Materials and Inventory Management · Organization/Department Assessment · Planning · Product and ServiceCertified Professional in Supply Management (CPSM) Review Series: Exam 2: Effective Supply Management Performance Dates: October 28, 2011 Location: Rutgers University­ Livingston Campus, Tillett Hall

  1. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    of the European Infrastructure for Electrical Power Exchange Antonio DIU Louis WEHENKEL Red Electrica de Espa~na S other places around the World, in Europe the electric power sector is undergoing a series of very impor. While the Euro- pean Electric Power System (EPS) was traditionally con- sidered as one of the most

  2. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere isArbitrary|

  3. Appendix A: Choosing and Using Assessment Management Systems: What Librarians Need to Know Megan Oakleaf, Jackie Belanger, Carlie Graham | ACRL National Conference, 2013AMS

    E-Print Network [OSTI]

    Oakleaf, Megan

    Oakleaf, Jackie Belanger, Carlie Graham | ACRL National Conference, 2013AMS Characteristics Facets, library, etc.) Y Y N Y Y Y Y Y Y Y RepositoryCapacity Serves as a repository for assessment evidence assignment of assessment tasks/responsibilities/duties Y Y Y Y Y Y Y Y Y Y Allows for role-based or unit

  4. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03T23:59:59.000Z

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

  5. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

    1998-01-01T23:59:59.000Z

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  6. A graph-based system for network-vulnerability analysis

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.

    1998-06-01T23:59:59.000Z

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  7. U-238: HP Service Manager Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

  8. Analyses of power system vulnerability and total transfer capability

    E-Print Network [OSTI]

    Yu, Xingbin

    2006-04-12T23:59:59.000Z

    limits. Both steady state and dynamic security assessments are included in the process of obtaining total transfer capability. Particularly, the effect of FACTS (Flexible AC Transmission Systems) devices on TTC is examined. FACTS devices have been shown...

  9. Program & Project Management For The Acquisition Of Capital Assets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program & Project Management For The Acquisition Of Capital Assets Program & Project Management For The Acquisition Of Capital Assets Project Assessment and Reporting...

  10. addressing waste management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    outside the Former Hazardous Waste Management Homes, Christopher C. 25 Beyond 70%: Assessing Alternative Waste Management Opportunities for Institutions. Open Access Theses and...

  11. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  12. Seismic vulnerability of older reinforced concrete frame structures in Mid-America

    E-Print Network [OSTI]

    Beason, Lauren Rae

    2004-09-30T23:59:59.000Z

    This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

  13. Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard

    E-Print Network [OSTI]

    Leal, Manuel S.

    Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

  14. A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

  15. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22T23:59:59.000Z

    Do nations' allies and trading partners affect their vulnerability to transnational terrorist attacks? Prior research has focused on how the attributes of individual nations, such as regime type, economic stability, and international power, affect...

  16. DNA repair modulates the vulnerability of the developing brain to alkylating agents

    E-Print Network [OSTI]

    Samson, Leona D.

    Neurons of the developing brain are especially vulnerable to environmental agents that damage DNA (i.e., genotoxicants), but the mechanism is poorly understood. The focus of the present study is to demonstrate that DNA ...

  17. Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems

    E-Print Network [OSTI]

    Michaud, David, 1975-

    2005-01-01T23:59:59.000Z

    The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

  18. A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress

    E-Print Network [OSTI]

    Covington, Herbert E.

    Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

  19. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01T23:59:59.000Z

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to further characterise...

  20. EA-1117: Final Environmental Assessment | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Environmental Assessment EA-1117: Final Environmental Assessment Management of Spent Nuclear Fuel on the Oak Ridge Reservation, Oak Ridge, Tennessee This EA evaluates the...

  1. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  2. Children with disabilities in the context of disaster: A social vulnerability perspective

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    through a social vulnerability perspective they all can be seen as lacking access to vital economic and social resources, possessing lim- ited autonomy and power, and having low levels of social capital (Morrow, 1999). They also, for socio- historical... of these socially vulnerable populations, but we do not yet know what parts of the community infrastructure are most critical to support their resilience in the post- disaster context. Given the dearth of empirical studies that actu- ally explore how disaster...

  3. Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico

    E-Print Network [OSTI]

    Sanchez Flores, Maria Del Rosario

    2010-10-12T23:59:59.000Z

    and Hydrological Science iii ABSTRACT Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico. (August 2009) Maria del Rosario Sanchez Flores, B.S., Monterrey Tech.; M.S., Instituto Matias Romero Co-Chairs of Advisory Committee: Dr... this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer...

  4. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  5. Flexible Work Arrangements Manager Guidelines

    E-Print Network [OSTI]

    Jones, Michelle

    Flexible Work Arrangements Manager Guidelines The Ohio State University Office of Human Resources Page 1 of 2 Flexible Work Arrangement ­ Manager Assessment Issued 07/15/10 When you receive a proposal your manager to review for a decision. Remember that granting a flexible work arrangement may help

  6. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT AND ENVIRONMENTAL HEALTH & INSTRUCTIONAL SAFETY 2009 ANNUAL REPORTS #12;2009 Annual Report Page 2 RISK MANAGEMENT I. Program Cost One method to assess the effectiveness of the University's risk management program is to compare the annual cost

  7. CALIFORNIA STATE UNIVERSITY, RISK MANAGEMENT

    E-Print Network [OSTI]

    de Lijser, Peter

    CALIFORNIA STATE UNIVERSITY, FULLERTON RISK MANAGEMENT 2010 ANNUAL REPORT #12;2010 Annual Report Page 2 I. Program Cost One method to assess the effectiveness of the University's risk management,538 $ 197,196 TOTAL Risk Management Costs $ 4,675,390 $ 4,541,975 $ 3,764,749 $ 3,703,959 $ 4

  8. Guidance document for groundwater protection needs assessments

    SciTech Connect (OSTI)

    Cobb, R.P.; Berg, R.C.; Wehrmann, H.A.

    1995-01-01T23:59:59.000Z

    The purpose of this document is to serve as a guidebook for conducting Groundwater Protection Needs Assessments (GPNA). The intent of a GPNA is to provide a comprehensive evaluation of the groundwater protection measures necessary in order to assure a long-term supply of potable water that is not highly vulnerable to contamination. The Illinois Environmental Protection Agency (IEPA), the Illinois State Geological Survey (ISGS) and the Illinois State Water Survey (ISWS) have developed the approach discussed for undertaking of GPNA.

  9. Kiran Chandra Sapkota Livelihood strategies and vulnerability of urban poor

    E-Print Network [OSTI]

    Richner, Heinz

    management of drinking water. 97.7 percent HHs have got the electricity and entertainment facilities, electric charge, etc. This study has tried to show five capital assets of urban poor in Khadi Pakha in local social institution but not represented in local government. Above 95 percent HHs involved

  10. Information related to low-level mixed waste inventory, characteristics, generation, and facility assessment for treatment, storage, and disposal alternatives considered in the U.S. Department of Energy Waste Management Programmatic Environmental Impact Statement

    SciTech Connect (OSTI)

    Wilkins, B.D.; Dolak, D.A.; Wang, Y.Y.; Meshkov, N.K.

    1996-12-01T23:59:59.000Z

    This report was prepared to support the analysis of risks and costs associated with the proposed treatment of low-level mixed waste (LLMW) under management of the US Department of Energy (DOE). The various waste management alternatives for treatment of LLMW have been defined in the DOE`s Office of Waste Management Programmatic Environmental Impact Statement. This technical memorandum estimates the waste material throughput expected at each proposed LLMW treatment facility and analyzes potential radiological and chemical releases at each DOE site resulting from treatment of these wastes. Models have been developed to generate site-dependent radiological profiles and waste-stream-dependent chemical profiles for these wastes. Current site-dependent inventories and estimates for future generation of LLMW have been obtained from DOE`s 1994 Mixed Waste Inventory Report (MWIR-2). Using treatment procedures developed by the Mixed Waste Treatment Project, the MWIR-2 database was analyzed to provide waste throughput and emission estimates for each of the different waste types assessed in this report. Uncertainties in the estimates at each site are discussed for waste material throughputs and radiological and chemical releases.

  11. Pacific Gas and Electric Company's Compressed Air Management Program: A Performance Assessment Approach to Improving Industrial Compressed Air System Operation and Maintenance

    E-Print Network [OSTI]

    Qualmann, R. L.; Zeller, W.; Baker, M.

    equipment: ? AEC MicroDataLogger. Four channel data recorder. ? Veris Hawkeye self-contained split-core kW transducer. Samples voltage and current in a three-phase circuit to produce a 4-20mA output proportional to true RMS power with 1% full scale... Commission 1997 Utility Sales Data. 3. US Bureau of the Census - 1994 Manufacturing Energy Consumption Survey (MECS). 4. US DOE Motor Chal1enge Market Assessment Inventory (MAl). 5. US DOE Office of Industrial Technology Industrial Assessment...

  12. Sewer asset management: fusion of performance indicators into decision criteria

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    .) Performance Assessment of Urban Infrastructure Services. Drinking water, waste water and solid waste. London Services. Drinking water, waste water and solid waste. London(UK): IWA Publishing, 195-205. hal-00393155 from network and treatment plant operation, data related to the vulnerability of the build environment

  13. Save Energy Now (SEN) Assessment Helps Expand Energy Management Program at Shaw Industries: Flooring Company Saves $872,000 Annually by Improving Steam System Efficiency

    SciTech Connect (OSTI)

    Not Available

    2008-07-01T23:59:59.000Z

    This case study describes how the Shaw Industries plant #20 in Dalton, Georgia, achieved annual savings of $872,000 and 93,000 MMBtu after receiving a DOE Save Energy Now energy assessment and implementing recommendations to improve the efficiency of its steam system.

  14. Disaster Planning for Vulnerable Populations: Leveraging Community Human Service

    E-Print Network [OSTI]

    Salzman, Daniel

    that preparing effectively for catastrophic events cannot be accomplished with a single, simple template, a function-based assessment tool, and a 5 Steps to Preparedness module. Results: Results from a survey were effectively for catastrophic events cannot be accomplished with a single, simple template. In- clusion

  15. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  16. DOE limited standard: Operations assessments

    SciTech Connect (OSTI)

    NONE

    1996-05-01T23:59:59.000Z

    Purpose of this standard is to provide DOE Field Element assessors with a guide for conducting operations assessments, and provide DOE Field Element managers with the criteria of the EM Operations Assessment Program. Sections 6.1 to 6.21 provide examples of how to assess specific areas; the general techniques of operations assessments (Section 5) may be applied to other areas of health and safety (e.g. fire protection, criticality safety, quality assurance, occupational safety, etc.).

  17. Corporate Functional Management Evaluation of the LLNL Radiation Safety Organization

    SciTech Connect (OSTI)

    Sygitowicz, L S

    2008-03-20T23:59:59.000Z

    A Corporate Assess, Improve, and Modernize review was conducted at Lawrence Livermore National Laboratory (LLNL) to evaluate the LLNL Radiation Safety Program and recommend actions to address the conditions identified in the Internal Assessment conducted July 23-25, 2007. This review confirms the findings of the Internal Assessment of the Institutional Radiation Safety Program (RSP) including the noted deficiencies and vulnerabilities to be valid. The actions recommended are a result of interviews with about 35 individuals representing senior management through the technician level. The deficiencies identified in the LLNL Internal Assessment of the Institutional Radiation Safety Program were discussed with Radiation Safety personnel team leads, customers of Radiation Safety Program, DOE Livermore site office, and senior ES&H management. There are significant issues with the RSP. LLNL RSP is not an integrated, cohesive, consistently implemented program with a single authority that has the clear roll and responsibility and authority to assure radiological operations at LLNL are conducted in a safe and compliant manner. There is no institutional commitment to address the deficiencies that are identified in the internal assessment. Some of these deficiencies have been previously identified and corrective actions have not been taken or are ineffective in addressing the issues. Serious funding and staffing issues have prevented addressing previously identified issues in the Radiation Calibration Laboratory, Internal Dosimetry, Bioassay Laboratory, and the Whole Body Counter. There is a lack of technical basis documentation for the Radiation Calibration Laboratory and an inadequate QA plan that does not specify standards of work. The Radiation Safety Program lack rigor and consistency across all supported programs. The implementation of DOE Standard 1098-99 Radiological Control can be used as a tool to establish this consistency across LLNL. The establishment of a site wide ALARA Committee and administrative control levels would focus attention on improved processes. Currently LLNL issues dosimeters to a large number of employees and visitors that do not enter areas requiring dosimetry. This includes 25,000 visitor TLDs per year. Dosimeters should be issued to only those personnel who enter areas where dosimetry is required.

  18. Enterprise Assessments Review, West Valley Demonstration Project...

    Energy Savers [EERE]

    Emergency Management Program Technical Basis and Emergency Preparedness The U.S. Department of Energy (DOE) independent Office of Enterprise Assessments (EA) was established in...

  19. Simulation and Risk Assessment Archived Projects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mellon University 412008 Simulation and Risk Assessment for Phase III Pilots Regional Carbon Sequestration Partnerships 1012008 Injection and Reservoir Hazard Management:...

  20. Independent Oversight Assessment, DOE Office of Environmental...

    Broader source: Energy.gov (indexed) [DOE]

    Safety Culture at the U.S. Department of Energy Office of Environmental Management Headquarters This report provides the results of an independent assessment of the safety culture...