Powered by Deep Web Technologies
Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Philosophy on Vulnerability Assessments  

NLE Websites -- All DOE Office Websites (Extended Search)

capabilities/vat/assess/ capabilities/vat/assess/ ARGONNE NATIONAL LABORATORY, Nuclear Engineering Division, 9700 South Cass Ave., Argonne, IL Philosophy on Vulnerability Assessments Argonne Vulnerability Assessment Team Roger G. Johnston, Ph.D., CPP , 630-252-6168 1. There are a number of conventional tools for finding security vulnerabilities. These include security surveys, risk management, design basis threat, CARVER Method, Delphi Method, software vulnerability assessment tools, infrastructure modeling, etc. 2. These tools have some value, and indeed we have used them all. 3. Experience has shown, however, that these methods do not usually result in dramatic improvements to security, nor do they reliably predict catastrophic security incidents that

2

HEPA Filter Vulnerability Assessment  

SciTech Connect

This assessment of High Efficiency Particulate Air (HEPA) filter vulnerability was requested by the USDOE Office of River Protection (ORP) to satisfy a DOE-HQ directive to evaluate the effect of filter degradation on the facility authorization basis assumptions. Within the scope of this assessment are ventilation system HEPA filters that are classified as Safety-Class (SC) or Safety-Significant (SS) components that perform an accident mitigation function. The objective of the assessment is to verify whether HEPA filters that perform a safety function during an accident are likely to perform as intended to limit release of hazardous or radioactive materials, considering factors that could degrade the filters. Filter degradation factors considered include aging, wetting of filters, exposure to high temperature, exposure to corrosive or reactive chemicals, and exposure to radiation. Screening and evaluation criteria were developed by a site-wide group of HVAC engineers and HEPA filter experts from published empirical data. For River Protection Project (RPP) filters, the only degradation factor that exceeded the screening threshold was for filter aging. Subsequent evaluation of the effect of filter aging on the filter strength was conducted, and the results were compared with required performance to meet the conditions assumed in the RPP Authorization Basis (AB). It was found that the reduction in filter strength due to aging does not affect the filter performance requirements as specified in the AB. A portion of the HEPA filter vulnerability assessment is being conducted by the ORP and is not part of the scope of this study. The ORP is conducting an assessment of the existing policies and programs relating to maintenance, testing, and change-out of HEPA filters used for SC/SS service. This document presents the results of a HEPA filter vulnerability assessment conducted for the River protection project as requested by the DOE Office of River Protection.

GUSTAVSON, R.D.

2000-05-11T23:59:59.000Z

3

Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration  

SciTech Connect

The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

1992-09-01T23:59:59.000Z

4

Vulnerability Assessment Team (VAT) - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Vulnerability Assessment Team Vulnerability Assessment Team VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

5

Seals Applications - Vulnerability Assessment Team - Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Maxims Read the Security Maxims Devil's Dictionary of Security Terms For more information: Vulnerability Assessment Section Sect. Manager: Roger G....

6

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

7

Definitions, Seals - Vulnerability Assessment Team - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Definitions Definitions VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

8

Safety - Vulnerability Assessment Team - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety Safety VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

9

Useful Resources- Vulnerability Assessment Team - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Selected Publications Selected Publications VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

10

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

11

Election Security - Vulnerability Assessment Team - Nuclear Engineerin...  

NLE Websites -- All DOE Office Websites (Extended Search)

on LinkedIn The Vulnerability Assessment Team has demonstrated easy to execute, non-cyber attacks on two different kinds of electronic voting machines. We believe that too...

12

CDKN-Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

Cartagena Vulnerability Assessment Cartagena Vulnerability Assessment Jump to: navigation, search Name CDKN-Colombia-Cartagena Vulnerability Assessment Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Sector Climate Topics Background analysis, Low emission development planning, Pathways analysis Website http://resilient-cities.iclei. Country Colombia UN Region South America References CDKN-Colombia-Cartagena Vulnerability Assessment[1] CDKN-Colombia-Cartagena Vulnerability Assessment Screenshot This article is a stub. You can help OpenEI by expanding it. References ↑ "CDKN-Colombia-Cartagena Vulnerability Assessment" Retrieved from "http://en.openei.org/w/index.php?title=CDKN-Colombia-Cartagena_Vulnerability_Assessment&oldid=407543

13

An assessment of fire vulnerability for aged electrical relays  

SciTech Connect

There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized.

Vigil, R.A. [Sandia National Labs., Albuquerque, NM (United States)]|[Science and Engineering Associates, Inc., Albuquerque, NM (United States); Nowlen, S.P. [Sandia National Labs., Albuquerque, NM (United States)

1995-03-01T23:59:59.000Z

14

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

Colombia-Cartagena Vulnerability Assessment Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Sector Climate Topics Background analysis, Low emission development planning, Pathways analysis Website http://resilient-cities.iclei. Country Colombia UN Region South America References CDKN-Colombia-Cartagena Vulnerability Assessment[1] Colombia-CDKN-Cartagena Vulnerability Assessment Screenshot This article is a stub. You can help OpenEI by expanding it. References ↑ "CDKN-Colombia-Cartagena Vulnerability Assessment" Retrieved from "http://en.openei.org/w/index.php?title=Colombia-Cartagena_Vulnerability_Assessment&oldid=699760"

15

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

16

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

17

The (In)Security of Drug Testing - Vulnerability Assessment Team...  

NLE Websites -- All DOE Office Websites (Extended Search)

Selected Papers > The (In)Security of Drug Testing VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security...

18

Assessing Network Infrastructure Vulnerabilities to Physical ...  

Science Conference Proceedings (OSTI)

... networks, air traffic control systems, and water distribution systems ... is that we consider the vulnerability to this ... States is buried in the ground within a ...

1999-11-05T23:59:59.000Z

19

India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate  

Open Energy Info (EERE)

Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Agency/Company /Organization Swiss Agency for Development and Cooperation Sector Energy, Land, Water Focus Area Agriculture Topics Co-benefits assessment, Background analysis Resource Type Lessons learned/best practices Website http://www.intercooperation.or Country India Southern Asia References India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change[1] India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Screenshot Contents 1 Introduction [1] 2 Community-based Institutions [2] 3 Pasture Land Development [3]

20

OLADE-Central America Climate Change Vulnerability Program | Open Energy  

Open Energy Info (EERE)

OLADE-Central America Climate Change Vulnerability Program OLADE-Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program Agency/Company /Organization Latin America Energy Organization Partner Ministries of Energy and Energy Enterprises Sector Energy, Land Topics Background analysis Website http://www.olade.org/proyecto_ Program Start 2010 Program End 2011 Country Belize, Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua, Panama Central America, Central America, Central America, Central America, Central America, Central America, Central America References OLADE Energy and Climate Change Projects[1] OLADE is a Latin American organization working with Central American countries on climate change vulnerability for hydroelectric systems and

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of  

Open Energy Info (EERE)

Impacts, Vulnerability and Adaptation: The Case of Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Agency/Company /Organization World Agroforestry Centre Sector Land Focus Area Forestry Topics Adaptation, Background analysis, Co-benefits assessment Resource Type Publications Website http://www.worldagroforestry.o Country Philippines UN Region South-Eastern Asia References Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed[1] Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Screenshot This article is a stub. You can help OpenEI by expanding it.

22

New Seals - Vulnerability Assessment Team - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

More Information More Information VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

23

Insanely Fast Microprocessor Shop - Vulnerability Assessment Team - Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Insanely Fast Microprocessor Shop Insanely Fast Microprocessor Shop VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

24

About Seals - Vulnerability Assessment Team - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Seals Seals VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

25

Findings and Lessons, Seals - Vulnerability Assessment Team - Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Findings and Lessons Learned Findings and Lessons Learned VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

26

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

27

Common Myths about Tamper Indicating Seals - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Common Myths about Tamper Common Myths about Tamper Indicating Seals VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

28

Rapid Sampling from Sealed Containers - Vulnerability Assessment Team -  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and Nonproliferation and National Security > VAT > Current Projects > Rapid Sampling Tools > ... from Sealed Containers VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Tamper & Intrusion Detection Rapid Sampling from Sealed Containers Demo video Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned

29

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

30

An OVAL-based active vulnerability assessment system for enterprise computer networks  

Science Conference Proceedings (OSTI)

Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the security vulnerabilities. However, current vulnerability assessment methods may encounter ... Keywords: Attack path, Network security, Open vulnerability assessment language, Predicate logic, Relational database management system, Security vulnerability

Xiuzhen Chen; Qinghua Zheng; Xiaohong Guan

2008-11-01T23:59:59.000Z

31

The Journal of Physical Security - Vulnerability Assessment Team - Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Current Projects > The Journal of Physical Current Projects > The Journal of Physical Security VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

32

Safety - Vulnerability Assessment Team - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Safety Materials Disposition Decontamination & Decommissioning Nuclear Criticality Safety Nuclear Data Program Nuclear Waste Form Modeling Departments Engineering...

33

Seals References - Vulnerability Assessment Team - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure) The (In)Security of Drug Testing VAT in...

34

Current Projects: GPS Spoofing - Vulnerability Assessment Team...  

NLE Websites -- All DOE Office Websites (Extended Search)

References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure) The...

35

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

36

Argonne's Vulnerability  

NLE Websites -- All DOE Office Websites (Extended Search)

finding finding and fixing security flaws Argonne's Vulnerability assessment Team VAT researchers spend their workdays devising and demonstrating ways to defeat a wide variety of security devices, systems, and programs, ranging from electronic voting machines and global positioning systems (GPS) to nuclear safeguards programs and biometrics-based access control. This involves analyzing the security features, reverse-engineering the technology or

37

Aquifer Vulnerability Assessment to Petroleum Contaminants Based on Fuzzy Variable Set Theory and Geographic Information System  

Science Conference Proceedings (OSTI)

It is a common environmental and hydro-geological problem that groundwater system is contaminated by petroleum hydrocarbons. An important step of pollution control and treatment is aquifer vulnerability assessment. In this paper, a karst fissure groundwater ... Keywords: fuzzy variable set, GIS, aquifer, petroleum contamination, vulnerability, assessment

Li Qingguo; Ma Zhenmin; Fang Yunzhi; Chen Shouyu

2009-07-01T23:59:59.000Z

38

Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism  

Science Conference Proceedings (OSTI)

Critical facility vulnerability assessment is a highly complex strategic activity in combating the terrorism and necessitates a structured quantified methodology to support the decision-making process in defense planning. In the system perspective, the ... Keywords: Airport, Fuzzy Cognitive Maps (FCM), Fuzzy integrated vulnerability assessment model (FIVAM), Fuzzy set theory, Interdependency, Simple Multi-Attribute Rating Technique (SMART), Terrorism

Ilker Akgun; Ahmet Kandakoglu; Ahmet Fahri Ozok

2010-05-01T23:59:59.000Z

39

Equally Unprepared: Assessing the Hurricane Vulnerability of Undergraduate Students  

Science Conference Proceedings (OSTI)

Students have been described as being both particularly vulnerable to natural disasters and highly resilient in recovery. In addition, they often have been treated as a distinct, homogeneous group sharing similar characteristics. This research ...

Jason L. Simms; Margarethe Kusenbach; Graham A. Tobin

2013-07-01T23:59:59.000Z

40

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements  

Science Conference Proceedings (OSTI)

This paper proposes a new approach for assessing the organization's vulnerability to information-security breaches. Although much research has been done on qualitative approaches, the literature on numerical approaches to quantify information-security ... Keywords: Information security, Information-security measurement, Risk analysis, Security threats, Vulnerability measurement

Sandip C. Patel; James H. Graham; Patricia A. S. Ralston

2008-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Vulnerability assessment of medieval civic towers as a tool for retrofitting design  

Science Conference Proceedings (OSTI)

The seismic vulnerability of an ancient civic bell-tower is studied. Rather than seeing it as an intermediate stage toward a risk analysis, the assessment of vulnerability is here pursued for the purpose of optimizing the retrofit design. The vulnerability curves are drawn by carrying out a single time history analysis of a model calibrated on the basis of experimental data. From the results of this analysis, the medians of three selected performance parameters are estimated, and they are used to compute, for each of them, the probability of exceeding or attaining the three corresponding levels of light, moderate and severe damage. The same numerical model is then used to incorporate the effects of several retrofitting solutions and to re-estimate the associated vulnerability curves. The ultimate goal is to provide a numerical tool able to drive the optimization process of a retrofit design by the comparison of the vulnerability estimates associated with the different retrofitting solutions.

Casciati, Sara [ASTRA Department, University of Catania, Siracusa (Italy); Faravelli, Lucia [Department of Structural Mechanics, University of Pavia, Pavia, Pavia (Italy)

2008-07-08T23:59:59.000Z

42

Department of Energy Plutonium ES&H Vulnerability Assessment Savannah River Site interim compensatory measures  

Science Conference Proceedings (OSTI)

The Savannah River Site (SRS) has recently completed a self-assessment of potential vulnerabilities associated with plutonium and other transuranic materials stored at the site. An independent Working Group Assessment Team (WGAT) appointed by DOE/ES&H also performed an independent assessment, and reviewed and validated the site self-assessment. The purpose of this report is to provide a status of interim compensatory measures at SRS to address hazards in advance of any corrective actions. ES&H has requested this status for all vulnerabilities ranked medium or higher with respect to potential consequences to workers, environment, and the public.

Bickford, W.E.

1994-09-15T23:59:59.000Z

43

INDUSTRIAL ASSESSMENT CENTER PROGRAM  

Science Conference Proceedings (OSTI)

Since its establishment in 1990, San Diego State Universitys Industrial Assessment Center (IAC) has served close to 400 small and medium-sized manufacturing plants in Southern California. SDSU/IACs efforts to transfer state-of-the-art technologies to industry have increased revenues, cultivated creativity, improved efficiencies, and benefited the environment. A substantial benefit from the program has been the ongoing training of engineering faculty and students. During this funding cycle, SDSU/IAC has trained 31 students, 7 of the graduate. A total of 92 assessments and 108 assessment days were completed, resulting in 638 assessment recommendations.

ASFAW BEYENE

2008-09-29T23:59:59.000Z

44

A Selection of Papers from the Vulnerability Assessment Team...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Safety Materials Disposition Decontamination & Decommissioning Nuclear Criticality Safety Nuclear Data Program Nuclear Waste Form Modeling Departments Engineering...

45

Vulnerability Assessment Team (VAT) in the News - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Safety Materials Disposition Decontamination & Decommissioning Nuclear Criticality Safety Nuclear Data Program Nuclear Waste Form Modeling Departments Engineering...

46

Performance Assessment of a Heat Wave Vulnerability Index for Greater London, United Kingdom  

Science Conference Proceedings (OSTI)

This study reports on the assessment of a multivariate heat wave vulnerability index (HVI) developed for London in the United Kingdom. The HVI is assessed in terms of its ability to predict whether mortality and ambulance call-out attain above ...

Tanja Wolf; Glenn McGregor; Antonis Analitis

47

Contact the Vulnerability Assessment Team (VAT) - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure) The (In)Security of Drug Testing VAT in...

48

Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2  

SciTech Connect

The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

Fesharaki, F.; Rizer, J.P.; Greer, L.S.

1994-05-01T23:59:59.000Z

49

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

50

Data management for geospatial vulnerability assessment of interdependencies in US power generation  

Science Conference Proceedings (OSTI)

Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S. [Carnegie Mellon University, Pittsburgh, PA (United States). Dept. of Civil & Environmental Engineering

2009-09-15T23:59:59.000Z

51

Modeling s-t Path Availability to Support Disaster Vulnerability Assessment of Network Infrastructure  

E-Print Network (OSTI)

The maintenance of system flow is critical for effective network operation. Any type of disruption to network facilities (arcs/nodes) potentially risks loss of service, leaving users without access to important resources. It is therefore an important goal of planners to assess infrastructures for vulnerabilities, identifying those vital nodes/arcs whose debilitation would compromise the most source-sink (s-t) interaction or system flow. Due to the budgetary limitations of disaster management agencies, protection/fortification and planning for the recovery of these vital infrastructure facilities is a logical and efficient proactive approach to reducing worst-case risk of service disruption. Given damage to a network, evaluating the potential for flow between s-t pairs requires assessing the availability of an operational s-t path. Recent models proposed for identifying infrastructure vital to system flow have relied on enumeration of all s-t paths to support this task. This paper proposes an alternative model...

Matisziw, Timothy C

2010-01-01T23:59:59.000Z

52

Tornado Vulnerability in Texas  

Science Conference Proceedings (OSTI)

Tornado vulnerability depends on the incidence of and societal exposure to tornadoes for a particular location. This study assesses the vulnerability of Texas counties to tornadoes using tornado incidence and societal exposure composite scores. ...

Richard W. Dixon; Todd W. Moore

2012-01-01T23:59:59.000Z

53

Environmental Compliance Audit & Assessment Program Manual  

E-Print Network (OSTI)

Audit & Assessment Program Manual C-5 Appendix C. ExamplesAudit & Assessment Program Manual Prepared by: Environment,1 Original Issue All Rename manual; allow for internal and

Thorson, Patrick

2009-01-01T23:59:59.000Z

54

Hydraulic properties of the vadose zone at two typical sites in the Western Cape for the assessment of groundwater vulnerability to pollution.  

E-Print Network (OSTI)

?? Aquifer vulnerability assessment is increasingly becoming a very significant basis in order to fulfill the water demands in South Africa. Knowledge of soil hydraulic (more)

Samuels, Donovan.

2007-01-01T23:59:59.000Z

55

Climate change vulnerability assessments as catalysts for social learning: four case studies in south-eastern Australia  

SciTech Connect

Technical assessments of vulnerability and/or risk are increasingly being undertaken to assess the impacts of climate change. Underlying this is the belief that they will bring clarity to questions regarding the scale of institutional investments required, plausible adaptation policies and measures, and the timing of their implementation. Despite the perceived importance of technical assessments in 'evidence-based' decision environments, assessments cannot be undertaken independent of values and politics, nor are they capable of eliminating the uncertainty that clouds decision-making on climate adaptation As such, assessments can trigger as many questions as they answer, leaving practitioners and stakeholders to question their value. This paper explores the value of vulnerability/risk assessments in climate change adaptation planning processes as a catalyst for learning in four case studies in Southeastern Australia. Data were collected using qualitative interviews with stakeholders involved in the assessments and analysed using a social learning framework. This analysis revealed that detailed and tangible strategies or actions often do not emerge directly from technical assessments. However, it also revealed that the assessments became important platforms for social learning. In providing these platforms, assessments present opportunities to question initial assumptions, explore multiple framings of an issue, generate new information, and galvanise support for collective actions. This study highlights the need for more explicit recognition and understanding of the important role social learning plays in climate change vulnerability assessments and adaptation planning more broadly.

Preston, Benjamin L [ORNL

2012-01-01T23:59:59.000Z

56

Linear modeling and simulation of low-voltage electric system for single-point vulnerability assessment of military installation  

Science Conference Proceedings (OSTI)

This paper describes the formulation and development of a linear model to support the single-point vulnerability assessment of electric distribution systems at existing and future U.S. Department of Defense (DoD) military sites. The model uses flow sensitivity ...

Edgar C. Portante; Thomas N. Taxon; James A. Kavicky; Tarek Abdallah; Timothy K. Perkins

2008-12-01T23:59:59.000Z

57

NSTB Summarizes Vulnerable Areas  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NSTB Summarizes Vulnerable Areas NSTB Summarizes Vulnerable Areas Commonly Found in Energy Control Systems Experts at the National SCADA Test Bed (NSTB) discovered some common areas of vulnerability in the energy control systems assessed between late 2004 and early 2006. These vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. The paper "Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems" describes the vulnerabilities and recommended strategies for mitigating them. It should be of use to asset owners and operators, control system vendors, system integrators, and third-party vendors interested in enhancing the security characteristics of current and future products.

58

GIS-based method for the environmental vulnerability assessment to volcanic ashfall at Etna Volcano  

Science Conference Proceedings (OSTI)

The response of environment to ashfall was evaluated aiming at defining the vulnerability in the areas surrounding Mt. Etna volcano, Sicily. The two utilized scenarios assume different thickness of ashfall, over distances comparable with those covered ... Keywords: Corine land cover, Environmental vulnerability, GIS, Volcanic risk

Silvia Rapicetta; Vittorio Zanon

2009-09-01T23:59:59.000Z

59

Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

DOE Green Energy (OSTI)

For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented.

Durling, Jr., R L; Price, D E; Spero, K K

2005-01-03T23:59:59.000Z

60

Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.  

SciTech Connect

Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

Merkle, Peter Benedict

2006-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume II, part 7: Mound working group assessment team report  

Science Conference Proceedings (OSTI)

This is the report of a visit to the Mound site by the Working Group Assessment Team (WGAT) to assess plutonium vulnerabilities. Purposes of the visit were: to review results of the site`s self assessment of current practices for handling and storing plutonium; to conduct an independent assessment of these practices; to reconcile differences and assemble a final list of vulnerabilities; to calculate consequences and probability for each vulnerability; and to issue a report to the Working Group. This report, representing completion of the Mound visit, will be compiled along with those from all other sites with plutonium inventories as part of a final report to the Secretary of Energy.

NONE

1994-09-01T23:59:59.000Z

62

Assessment of chemical vulnerabilities in the Hanford high-level waste tanks  

SciTech Connect

The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

Meacham, J.E. [and others

1996-02-15T23:59:59.000Z

63

CRAD, Self-Assessment Program Assessment Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Self-Assessment Program Assessment Plan Self-Assessment Program Assessment Plan CRAD, Self-Assessment Program Assessment Plan Performance Objective: Management should ensure that effective management and independent self-assessments are being conducted periodically by technically qualified personnel. [10 CFR 830.122, subpart A & DOE O 414.1A, Quality Assurance] Criteria: Managers shall assess their management processes and be actively involved in the assessment process to ensure results contribute to improved performance of programs, systems, and work processes. DOE O 414.1A, Criterion 9 (a) An effective assessment and safety management program shall focus on achieving DOE/NNSA expectations through federal regulations and standards. DOE O 414.1A, Criterion 9 (a) An effective assessment supports management's goal to protect

64

CRAD, Self-Assessment Program Assessment Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Self-Assessment Program Assessment Plan Self-Assessment Program Assessment Plan CRAD, Self-Assessment Program Assessment Plan Performance Objective: Management should ensure that effective management and independent self-assessments are being conducted periodically by technically qualified personnel. [10 CFR 830.122, subpart A & DOE O 414.1A, Quality Assurance] Criteria: Managers shall assess their management processes and be actively involved in the assessment process to ensure results contribute to improved performance of programs, systems, and work processes. DOE O 414.1A, Criterion 9 (a) An effective assessment and safety management program shall focus on achieving DOE/NNSA expectations through federal regulations and standards. DOE O 414.1A, Criterion 9 (a) An effective assessment supports management's goal to protect

65

Assessment of government tribology programs  

SciTech Connect

An assessment has been made to determine current tribology research and development work sponsored or conducted by the government. Data base surveys and discussions were conducted to isolate current projects sponsored primarily by 21 different government organizations. These projects were classified by subject, objective, energy relevance, type of research, phenomenon being investigated, variables being studied, type of motion, materials and application. An abstract of each project was prepared which included the classification, sponsor, performing organization and a project description. It was found that current work is primarily materials oriented to meet military requirements. Other than the high temperature programs very few of the tribology projects accomplish energy related objectives.

Peterson, M.B.; Levinson, T.M.

1985-09-01T23:59:59.000Z

66

Assessment of Groundwater Vulnerability to Contamination Using Capture Zone Delineation in Shenzhen City, China  

Science Conference Proceedings (OSTI)

As a result of the large risk associated with the contamination of aquifers, it becomes imperative to protect groundwater supply areas. One of the practical methods that is projected for the protection of aquifers is to zone a boundary around current ... Keywords: MODPATH, capture zones, delineation, groundwater contamination, vulnerability

Chiha Aida; Aiguo Zhou; Jianwei Zhou; ShaoGang Dong

2009-07-01T23:59:59.000Z

67

Vulnerability assessment of groundwater resources: A modelling-based approach to the Mancha Occidental aquifer, Spain  

Science Conference Proceedings (OSTI)

The semiarid Mancha Occidental aquifer represents a paradigmatic case of intensive groundwater use for agriculture. Irrigation has proven a catalyst for welfare in the area over the last three decades, if at a significant environmental cost and while ... Keywords: Aquifer, Groundwater, Mancha Occidental, Participatory modelling, Vulnerability, Water Framework Directive

Pedro Martnez-Santos; M. Ramn Llamas; Pedro E. Martnez-Alfaro

2008-09-01T23:59:59.000Z

68

National Vulnerability Database Full Vulnerability Listing  

Science Conference Proceedings (OSTI)

NVD Complete Vulnerability Listing. This web page contains direct links to every National Vulnerability Database vulnerability entry. ...

69

V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Informix Genero libpng Integer Overflow Vulnerability 4: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT ASSESSMENT: Medium DISCUSSION: The libpng library used by IBM Informix Genero contains an integer overflow vulnerability. If you use IBM Informix Genero to handle PNG (Portable Network Graphics) image files and an attacker causes your IBM Informix Genero program to open or display a malicious PNG file, your IBM Informix

70

PROGRAM REVIEW Rubric for Assessing the Integration of Student Learning Assessment into Program Reviews  

E-Print Network (OSTI)

to improve their work. Well-qualified internal and external reviewers evaluate the program's learningPROGRAM REVIEW Rubric for Assessing the Integration of Student Learning Assessment into Program Reviews Criterion Initial Emerging Developed Highly Developed Required Elements of the Self-Study Program

71

Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling  

Science Conference Proceedings (OSTI)

Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

2009-03-26T23:59:59.000Z

72

Vulnerability Assessments - Vulnerability Assessment Team - Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

Useful Resources Useful Resources Contact the VAT Contact the VAT Other Nonproliferation & National Security Capabilities Work with Argonne Contact us For Employees Site...

73

A Hydroclimatological Assessment of Regional Drought Vulnerability: A Case Study of Indiana Droughts  

Science Conference Proceedings (OSTI)

Characterizing and developing drought climatology continues to be a challenging problem. As decision makers seek guidance on water management strategies, there is a need for assessing the performance of drought indices. This requires the ...

Umarporn Charusombat; Dev Niyogi

2011-09-01T23:59:59.000Z

74

ASSESSMENT OF SRSO TRAINING & QUALIFICATION PROGRAM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT OF SRSO TRAINING & QUALIFICATION PROGRAM ASSESSMENT OF SRSO TRAINING & QUALIFICATION PROGRAM This self assessment evaluates the effective implementation of the Technical Qualification Programs (TQP). The Federal Technical Capability Panel (FTCP) also reviews the results of the TQP self- assessments and determines if further action is necessary on a Departmental level. Federal Technical Capability: LOIs a. FTC-1. Executive Commitment and Line Management Ownership. Line management is actively involved in all aspects of technical employee recruitment, retention, development, and deployment. 1.1 Line managers are aware of the requirements and administrative flexibilities associated with recruiting, hiring, and retaining high-quality technical employees. 1.2 Senior line management supports the continuous technical

75

Seismic Vulnerability Assessment for Massive Structure: Case Study for Sofia City  

SciTech Connect

An advanced modeling technique, which allows us to compute realistic synthetic seismograms, is used to create a database of synthetic accelerograms in a set of selected sites located within Sofia urban area. The accelerograms can be used for the assessment of the local site response, represented in terms of Response Spectra Ratio (RSR). The result of this study, i.e. time histories, response spectra and other ground motion parameters, can be used for different earthquake engineering analyses. Finally, with the help of 3D finite elements modeling, the building structural performance is assessed.

Paskaleva, Ivanka; Koleva, Gergana [CLSMEE-BAS, 3 Acad. G. Bonchev str, 1113 Sofia (Bulgaria); Vaccari, Franco; Panza, Giuliano F. [DST-University of Trieste, E. Weiss 4, 34127 Trieste (Italy)

2008-07-08T23:59:59.000Z

76

Environmental Compliance Audit& Assessment Program Manual  

SciTech Connect

This document describes the elements, schedule, roles, and responsibilities of the Lawrence Berkeley National Laboratory (LBNL) Environmental Compliance Audit & Assessment Program (ECAAP). The ECAAP has been developed to meet the requirements of DOE Order 450.1A,1 and Executive Order 13423.2 These referenced Orders stipulate that government agencies must develop environmental compliance audit programs to monitor and improve compliance with environmental regulations. As stated specifically in the DOE Order, as a part of a DOE facility's Environmental Management System (EMS), 'An environmental compliance audit and review program that identifies compliance deficiencies and root causes of non-compliance' shall be developed and implemented. The ECAAP has also been developed to satisfy LBNL's institutional technical assurance assessment requirements promulgated in the Environment, Safety and Health (ES&H) Self-Assessment Program (LBNL/PUB-5344) and described by the ES&H Technical Assurance Program (TAP) Manual (LBNL/PUB-913E). The ES&H TAP Manual provides the framework for systematic reviews of ES&H programs with the intent to provide assurance that these programs comply with their guiding regulations, are effective, and are properly implemented. As required by the DOE and Executive Orders and by LBNL's TAP, the goal of the ECAAP is to identify environmental regulatory compliance deficiencies and to determine their respective causes. The ECAAP then provides a means of correcting any deficiencies identified, and leads to continually improving environmental compliance performance.

Thorson, Patrick; Baskin, David; Borglin, Ned; Fox, Robert; Wahl, Linnea; Hatayama, Howard; Pauer, Ronald

2009-03-13T23:59:59.000Z

77

Microsoft Word - Assessment-B-ProgramCriteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ATTACHMENT B ATTACHMENT B PROGRAM ASSESSMENT CRITERIA Identify the following for all sites: Program Management * Number FTE's devoted to Records Management o Full-time Federal and Contractor o Part-time Federal and Contractor Percent of time spent on Records Management duties * Percentage of time each Records Management employee is assigned to: o Program Management o Operations Training/Assistance Schedule Application Records Holding/Storage Area Activities EEOICPA Claims * Monthly Claim Volume Other, specify o Contractor Oversight * Manpower/Support Costs o Series and Grade levels for Federal FTE's o Contractor costs * Records Management Expertise o Federal and Contractor Records-related Training received within the last three

78

Comprehensive environmental assessment and response program  

Science Conference Proceedings (OSTI)

The US Department of Energy's (USDOE) Albuquerque Operations Office installations are being evaluated under its Comprehensive Environmental Assessment and Response program (CEARP). The installations consist of eight weapons development and production facilities, which are located across the United States. The evaluation covers the major environmental regulations, with emphasis on the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and on the Resource Conservation and Recovery Act (RCRA). The CEARP is intended to help fulfill USDOE obligations for federal facilities under the US Environmental Protection Agency (CERCLA Program and constitutes the same basic approach as contained in USEPA guidance to federal facilities. The Program is a phased program to identify, assess, and correct existing and potential environmental concerns relative to these regulations. The five phases are Phase I - Installation Assessment, Phase II - Confirmation, Phase III - Technological Assessment, Phase IV - Remedial Action, and Phase V - Compliance and Verification. Phase I activities and reports should be completed during 1986. The Phase II generic sampling plans, data management plans, health and safety plans, and quality assurance/quality control plans will be prepared during 1986. Significant characterization of CERCLA sites will be initiated during 1987.

Gunderson, T.C.; Vocke, R.W.; Stoker, A.K.

1986-01-01T23:59:59.000Z

79

Earthquake engineering programs at the Lawrence Livermore Laboratory  

SciTech Connect

Information is presented concerning assessments of current seismic design methods; systematic evaluation program for older operating reactors; seismic vulnerability of fuel reprocessing facilities; and advisability of seismic scram.

Tokarz, F.J.

1980-02-28T23:59:59.000Z

80

Assessment of Building Energy-Saving Policies and Programs in...  

NLE Websites -- All DOE Office Websites (Extended Search)

Assessment of Building Energy-Saving Policies and Programs in China During the 11th Five Year Plan Title Assessment of Building Energy-Saving Policies and Programs in China During...

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Energy vulnerability relationships  

Science Conference Proceedings (OSTI)

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

Shaw, B.R.; Boesen, J.L.

1998-02-01T23:59:59.000Z

82

Technical Qualification Program Self-Assessment Report - Pacific Northwest  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program Self-Assessment Report - Pacific Technical Qualification Program Self-Assessment Report - Pacific Northwest Site Office Technical Qualification Program Self-Assessment Report - Pacific Northwest Site Office This self-assessment evaluated how well the Technical Qualification and Federal Capability Programs were implemented at the Pacific Northwest Site Office. The assessment was conducted in accordance with the SCMS: Quality Assurance and Oversight: Subject Area: Assessments, Procedure 2, Performing Assessments and SCMS: Quality Assurance and Oversight: Subject Area: Issues Management, Procedure 1, Managing Issues Identified in Oversight Activities. PNSO TQP Self-Assessment More Documents & Publications Technical Qualification Program Self-Assessment Report - Livermore Field Office Technical Qualification Program and FTCP Assessment CRADs

83

Assessment of the Fusion Energy Sciences Program. Final Report  

SciTech Connect

An assessment of the Office of Fusion Energy Sciences (OFES) program with guidance for future program strategy. The overall objective of this study is to prepare an independent assessment of the scientific quality of the Office of Fusion Energy Sciences program at the Department of Energy. The Fusion Science Assessment Committee (FuSAC) has been appointed to conduct this study.

2001-05-01T23:59:59.000Z

84

Better Buildings Neighborhood Program: Step 9: Assess Your Progress  

NLE Websites -- All DOE Office Websites (Extended Search)

9: Assess 9: Assess Your Progress to someone by E-mail Share Better Buildings Neighborhood Program: Step 9: Assess Your Progress on Facebook Tweet about Better Buildings Neighborhood Program: Step 9: Assess Your Progress on Twitter Bookmark Better Buildings Neighborhood Program: Step 9: Assess Your Progress on Google Bookmark Better Buildings Neighborhood Program: Step 9: Assess Your Progress on Delicious Rank Better Buildings Neighborhood Program: Step 9: Assess Your Progress on Digg Find More places to share Better Buildings Neighborhood Program: Step 9: Assess Your Progress on AddThis.com... Getting Started Driving Demand Set Goals & Objectives Create an Evaluation Plan Conduct Audience Research Identify Target Audiences & Behavior Changes Create Effective Messages

85

Federal Energy Management Program: Assess Potential Agency Size Changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Assess Potential Assess Potential Agency Size Changes that Impact Greenhouse Gas Emissions to someone by E-mail Share Federal Energy Management Program: Assess Potential Agency Size Changes that Impact Greenhouse Gas Emissions on Facebook Tweet about Federal Energy Management Program: Assess Potential Agency Size Changes that Impact Greenhouse Gas Emissions on Twitter Bookmark Federal Energy Management Program: Assess Potential Agency Size Changes that Impact Greenhouse Gas Emissions on Google Bookmark Federal Energy Management Program: Assess Potential Agency Size Changes that Impact Greenhouse Gas Emissions on Delicious Rank Federal Energy Management Program: Assess Potential Agency Size Changes that Impact Greenhouse Gas Emissions on Digg Find More places to share Federal Energy Management Program: Assess

86

ASSESSMENT OF TECHNICAL QUALIFICATION AND FEDERAL TECHNICAL CAPABILITY PROGRAMS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

And TQP Assessment Crads 11 2012 Smooth (2) 1 11/29/12 And TQP Assessment Crads 11 2012 Smooth (2) 1 11/29/12 ASSESSMENT OF TECHNICAL QUALIFICATION AND FEDERAL TECHNICAL CAPABILITY PROGRAMS This document provides guidance and objectives and criteria to support assessments required by DOE O 426.1 Federal Technical Capability (FTC), Section 4. REQUIREMENTS, paragraph b. FTC Program Implementation, subparagraph (7) Self- Assessment. This FTC Order paragraph requires self-assessment of TQP and FTC Program implementation within one's organization. To ensure effective implementation of the Technical Qualification Programs (TQP), Headquarters and field elements conduct self-assessments of these programs. The Federal Technical Capability Panel (FTCP) also reviews the results of the TQP self-assessments and determines if further action is

87

NANA Geothermal Assessment Program Final Report  

Science Conference Proceedings (OSTI)

In 2008, NANA Regional Corporation (NRC) assessed geothermal energy potential in the NANA region for both heat and/or electricity production. The Geothermal Assessment Project (GAP) was a systematic process that looked at community resources and the community's capacity and desire to develop these resources. In October 2007, the US Department of Energy's Tribal Energy Program awarded grant DE-FG36-07GO17075 to NRC for the GAP studies. Two moderately remote sites in the NANA region were judged to have the most potential for geothermal development: (1) Granite Mountain, about 40 miles south of Buckland, and (2) the Division Hot Springs area in the Purcell Mountains, about 40 miles south of Shungnak and Kobuk. Data were collected on-site at Granite Mountain Hot Springs in September 2009, and at Division Hot Springs in April 2010. Although both target geothermal areas could be further investigated with a variety of exploration techniques such as a remote sensing study, a soil geochemical study, or ground-based geophysical surveys, it was recommended that on-site or direct heat use development options are more attractive at this time, rather than investigations aimed more at electric power generation.

Jay Hermanson

2010-06-22T23:59:59.000Z

88

Idaho National Laboratory - Hydropower Program - Resource Assessment  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydropower Evaluation Software State Resource Assessments Resource Assessments Reports Technology Transfer Virtual Hydropower Prospector Virtual Hydropower Prospector do Brasil...

89

City of Aspen - Energy Assessment Rebate Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Aspen - Energy Assessment Rebate Program City of Aspen - Energy Assessment Rebate Program City of Aspen - Energy Assessment Rebate Program < Back Eligibility Commercial Residential Savings Category Home Weatherization Commercial Weatherization Sealing Your Home Design & Remodeling Windows, Doors, & Skylights Ventilation Appliances & Electronics Commercial Lighting Lighting Heating & Cooling Commercial Heating & Cooling Maximum Rebate $225 Program Info State Colorado Program Type Utility Rebate Program Rebate Amount Up to $225 Provider City of Aspen Community Development The City of Aspen encourages interested residents and businesses to increase the energy efficiency of homes and offices through the Energy Assessment Program. Participating homes and offices must located within the city and have a BPI-certified energy assessment performed on the property

90

Assessment of Building Energy-Saving Policies and Programs in...  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy-Saving Policies and Programs in China During the 11th Five Year Plan Title Assessment of Building Energy-Saving Policies and Programs in China During the 11th Five...

91

Technical Qualification Program Self-Assessment Report - Nevada Site Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program Self-Assessment Report - Nevada Technical Qualification Program Self-Assessment Report - Nevada Site Office Technical Qualification Program Self-Assessment Report - Nevada Site Office An accreditation assessment of the National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Technical Qualification Program (TQP) was conducted during the week of October 5-8, 2009. The accreditation of the TQP will enable NSO to demonstrate that they have an effective program in place to ensure the technical competency of the individuals performing these activities. In order to initiate the accreditation process, a comprehensive self-assessment of the TQP against the objectives and supporting criteria is required. This report documents the details and conclusions of that self-assessment. NNSA-NSO TQP Self-Assessment, October 2009

92

Technical Qualification Program Self-Assessment Report - Livermore Field  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Livermore Livermore Field Office Technical Qualification Program Self-Assessment Report - Livermore Field Office The purpose of the Livermore Field Office (LFO) Teclmical Qualification Program (TQP) is to ensure that federal teclmical personnel with safety oversight responsibilities at defense nuclear facilities at Lawrence Livermore National Laboratory possess competence commensurate with responsibilities. LFO is committed to ensuring it has the necessary teclmical capabilities to provide the kind of management, direction, and guidance essential to safe operation ofDOE's defense nuclear facilities. LFO TQP Self-Assessment, May 2013 More Documents & Publications Technical Qualification Program Self-Assessment Report - Nevada Site Office Technical Qualification Program Self-Assessment Report - Sandia Site Office

93

ARM Program Data Quality Inspection and Assessment Activities...  

NLE Websites -- All DOE Office Websites (Extended Search)

ARM Program Data Quality Inspection and Assessment Activities: A Streamlined Approach C. P. Bahrmann, R. A. Peppler, K. L. Sonntag, and A. R. Dean Cooperative Institute for...

94

UNEP Risoe Technology Needs Assessment Program | Open Energy Information  

Open Energy Info (EERE)

Needs Assessment Program Needs Assessment Program Jump to: navigation, search Name UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Argentina, Bangladesh, Cambodia, Costa Rica, Georgia (country), Guatemala, Indonesia, Ivory Coast, Kenya, Mali, Morocco, Peru, Senegal, Thailand, Vietnam South America, Southern Asia, South-Eastern Asia, Central America, Western Asia, Central America, South-Eastern Asia, Western Africa, Eastern Africa, Western Africa, Northern Africa, South America, Western Africa, South-Eastern Asia, South-Eastern Asia References UNEP Risoe-Technology Needs Assessment Program[1]

95

Energy Program Assessment Matrix | ENERGY STAR Buildings & Plants  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Assessment Matrix Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction...

96

NANA Wind Resource Assessment Program Final Report  

DOE Green Energy (OSTI)

NANA Regional Corporation (NRC) of northwest Alaska is located in an area with abundant wind energy resources. In 2007, NRC was awarded grant DE-FG36-07GO17076 by the US Department of Energy's Tribal Energy Program for funding a Wind Resource Assessment Project (WRAP) for the NANA region. The NANA region, including Kotzebue Electric Association (KEA) and Alaska Village Electric Cooperative (AVEC) have been national leaders at developing, designing, building, and operating wind-diesel hybrid systems in Kotzebue (starting in 1996) and Selawik (2002). Promising sites for the development of new wind energy projects in the region have been identified by the WRAP, including Buckland, Deering, and the Kivalina/Red Dog Mine Port Area. Ambler, Shungnak, Kobuk, Kiana, Noorvik & Noatak were determined to have poor wind resources at sites in or very near each community. However, all five of these communities may have better wind resources atop hills or at sites with slightly higher elevations several miles away.

Jay Hermanson

2010-09-23T23:59:59.000Z

97

Senior Technical Safety Manager Qualification Program Self-Assessment -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senior Technical Safety Manager Qualification Program Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of Nuclear Safety Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of Nuclear Safety A self-assessment of the CNS Senior Technical Safety Manager (STSM) Qualification Program was conducted during the week of July 8, 2013, when all STSM-qualified staff members were present in Germantown, Maryland. This was the first self-assessment that CNS has conducted. In accordance CNS Standard Operating Procedure SOP-016, Senior Technical Safety Manager Qualification Program, a self-assessment is required once every four years. Chief of Nuclear Safety STSM Self-Assessment, August 2013 More Documents & Publications 2010 Annual Workforce Analysis and Staffing Plan Report - Chief of Nuclear

98

Self-assessment program implementation plan. Revision A  

Science Conference Proceedings (OSTI)

This implementation plan identifies and describes the tasks that must be completed in order to successfully implement a Self-Assessment (SA) Program. The purpose of the Self-Assessment Program is to comply with applicable Department of Energy (DOE) directives and orders, Federal, State, and local regulations, operate the Pinellas Plant according to best management practices, and achieve excellence in all operating areas. The Self-Assessment Program will be applied to the Pinellas Plant facility which includes buildings, grounds, equipment, operations, and activities under the control of line management. Furthermore, all applicable disciplines under environmental protection, safety, health and management will be covered by the program. The Self-Assessment Program has been designed to accomplish the following tasks: define the scope of the Self-Assessment Program; assign organizational roles and responsibilities; address EH and S functional elements and management issues; develop a Self-Assessment program charter and policy; identify all applicable EH and S codes, regulations and standards; develop self-assessment procedures and instructions; generate a Self-Assessment Manual; develop a master schedule for facility appraisals and audits; design checklists and report formats for recording appraisal data; implement an assessment tracking and reporting system; implement a root cause analysis and corrective action system; implement a trend analysis and lessons learned system; and establish a formal training program.

Quets, A.L.

1991-10-23T23:59:59.000Z

99

Argentina-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Argentina-UNEP Risoe Technology Needs Assessment Program Argentina-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Argentina-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Climate, Energy, Land, Water Focus Area Renewable Energy, Non-renewable Energy, Agriculture, Biomass, - Waste to Energy, Industry, - Industrial Processes, Transportation Topics Adaptation, Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/index.p Program Start 2009 Program End 2013 Country Argentina South America References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects

100

Technical Qualification Program Self-Assessment Report - Livermore Field  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program Self-Assessment Report - Livermore Technical Qualification Program Self-Assessment Report - Livermore Field Office Technical Qualification Program Self-Assessment Report - Livermore Field Office The purpose of the Livermore Field Office (LFO) Teclmical Qualification Program (TQP) is to ensure that federal teclmical personnel with safety oversight responsibilities at defense nuclear facilities at Lawrence Livermore National Laboratory possess competence commensurate with responsibilities. LFO is committed to ensuring it has the necessary teclmical capabilities to provide the kind of management, direction, and guidance essential to safe operation ofDOE's defense nuclear facilities. LFO TQP Self-Assessment, May 2013 More Documents & Publications Technical Qualification Program Self-Assessment Report - Pacific Northwest

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Performance Assessment Strategy Plan for the Geologic Repository Program  

Science Conference Proceedings (OSTI)

Performance assessment is a major constituent of the program being conducted by the US Department of Energy (DOE) to develop a geologic repository. Performance assessment is the set of activities needed for quantitative evaluations to assess compliance with the performance requirements in the regulations for a geologic repository and to support the development of the repository. The strategy for these evaluations has been documented in the Performance Assessment Strategy Plan (DOE, 1989). The implementation of the performance assessment strategy is defined in this document. This paper discusses the scope and objectives of the implementation plan, the relationship of the plan to other program plans, summarizes the performance assessment areas and the integrated strategy of the performance assessment program. 1 fig., 3 tabs.

NONE

1990-01-01T23:59:59.000Z

102

Federal Technical Capability Program Assessment Guidance and Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TECHNICAL CAPABILITY PROGRAM TECHNICAL CAPABILITY PROGRAM FEDERAL TECHNICAL CAPABILITY PROGRAM ASSESSMENT GUIDANCE AND CRITERIA Federal Technical Capability Panel and the Office of Human Resources and Administration U.S. Department of Energy Washington, D.C. 20585 September 1998 Federal Technical Capability Program Assessment Guidance and Criteria 1 September 15, 1998 INTRODUCTION The Federal Technical Capability Program provides for the recruitment, deployment, development and retention of federal personnel with the demonstrated technical capability to safely accomplish the Department' s missions and responsibilities. The Federal Technical Capability Panel (Panel) reports to the Deputy Secretary and oversees and resolves issues affecting the Federal Technical Capability Program. The Panel periodically assesses the effectiveness of the four functions of the

103

Water Power Program: Resource Assessment and Characterization  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

of the United States Ocean Wave Energy Resource This report, created by the Electric Power Research Institute, assesses ocean wave energy potential along the U.S. coasts....

104

Indonesia-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Indonesia-UNEP Risoe Technology Needs Assessment Program Indonesia-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Argentina-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Indonesia South-Eastern Asia References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

105

Morocco-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Morocco-UNEP Risoe Technology Needs Assessment Program Morocco-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Morocco-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Morocco Northern Africa References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

106

Thailand-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Thailand-UNEP Risoe Technology Needs Assessment Program Thailand-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Thailand-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Thailand South-Eastern Asia References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

107

Cambodia-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Cambodia-UNEP Risoe Technology Needs Assessment Program Cambodia-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Cambodia-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Cambodia South-Eastern Asia References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

108

Mali-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Mali-UNEP Risoe Technology Needs Assessment Program Mali-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Mali-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Mali Western Africa References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

109

Georgia-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Georgia-UNEP Risoe Technology Needs Assessment Program Georgia-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Georgia-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Georgia References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

110

Disjunctive Logic Programming: A Survey and Assessment  

Science Conference Proceedings (OSTI)

We describe the fields of disjunctive logic programming and disjunctive deductive databases from the time of their inception to the current time. Contributions with respect to semantics, implementations and applications are surveyed.In the last decade ...

Jack Minker; Dietmar Seipel

2002-01-01T23:59:59.000Z

111

Facility Representative Program Assessment Criteria, Review, and Approach Document (CRAD)  

NLE Websites -- All DOE Office Websites (Extended Search)

STD-1063-2011 STD-1063-2011 Appendix B B-1 FACILITY REPRESENTATIVE PROGRAM ASSESSMENT GUIDE The DOE has implemented its FR Program, and is looking to continuously improve the program's effectiveness DOE-wide. An effective FR Program has many elements, as described in this Standard. These elements are intended to yield a program that provides DOE facilities with well-trained FRs who spend appropriate amounts of time in their facilities and can work effectively with their contractor management counterparts. The program, to be effective, needs the functional support of management. To maintain the continued support of DOE management, the FR program needs to demonstrate its continued performance and effectiveness, which is to be assessed periodically using

112

Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents  

Science Conference Proceedings (OSTI)

The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

Not Available

1993-11-01T23:59:59.000Z

113

Software Vulnerability Taxonomy Consolidation  

SciTech Connect

In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of a particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data, which would be of use to system administrators, software developers and vulnerability researchers is not yet achieved, this work has resulted in the most exhaustive collection of vulnerability data to date.

Polepeddi, S

2004-12-08T23:59:59.000Z

114

Second Line of Defense Spares Program Assessment  

SciTech Connect

The Office of the Second Line of Defense (SLD) is part of the Department of Energys (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

2012-11-20T23:59:59.000Z

115

Quantifying software vulnerability  

Science Conference Proceedings (OSTI)

The technique known as ACE Analysis allows researchers to quantify a hardware structure's Architectural Vulnerability Factor (AVF) using simulation. This allows researchers to understand a hardware structure's vulnerability to soft errors and consider ... Keywords: fault tolerance, modeling, soft errors

Vilas Sridharan; David R. Kaeli

2008-05-01T23:59:59.000Z

116

Geothermal exploration and assessment technology program plan. Final report  

DOE Green Energy (OSTI)

The following program plan elements are described: barriers to commercialization, cost/benefit analysis for exploration assessment technology (hydrothermal systems), goals, objectives, technical plan, management plan, budget, and procurement plan. (MHR)

Not Available

1978-10-30T23:59:59.000Z

117

Environmental Hazards Assessment Program: Quarterly report, October--December 1993  

SciTech Connect

This report describes activities and reports on progress for the second quarter (October 93 - December 93) of the second year of the grant to support the Environmental Hazards Assessment Program (EHAP). It reports progress against grant objectives and the Program Implementation Plan published at the end of the first year of the grant.

Not Available

1994-02-01T23:59:59.000Z

118

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

119

Steam Generator Management Program: Steam Generator Integrity Assessment Guidelines  

Science Conference Proceedings (OSTI)

This report provides guidance for evaluating the condition of steam generator (SG) tubes based on nondestructive examination (NDE) or in situ pressure testing. The integrity assessments are normally performed during a reactor refueling outage. Nuclear power plant licensees who follow the guidance in this report will have satisfied the requirements for degradation assessments, condition monitoring, and operational assessment as defined in the Nuclear Energy Institute (NEI) Steam Generator Program Guidelin...

2009-11-19T23:59:59.000Z

120

Building Energy Codes Program: National Benefits Assessment, 1992-2040 |  

NLE Websites -- All DOE Office Websites (Extended Search)

Program: National Benefits Assessment, 1992-2040 Program: National Benefits Assessment, 1992-2040 Commercial and residential buildings account for approximately 41% of all energy consumption and 72% of electricity usage in the United States. Building energy codes and standards set minimum requirements for energy-efficient design and construction for new and renovated buildings, assuring reductions in energy use and greenhouse gas emissions over the life of buildings. The U.S. Department of Energy (DOE), through the Building Energy Codes Program (BECP or the Program), supports the improvement of energy efficiency in buildings. BECP periodically assesses the impacts of its activities by estimating historical and projected energy savings, consumer savings, and avoided emissions. The Pacific Northwest National Laboratory (PNNL) conducted the

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

PRIVACY IMPACT ASSESSMENT: INL Education Programs PIA Template  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Education Education Programs PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Elernent'& (Site 24/Jun/09 Idaho National Laboratory Information Operations and Research Center (IORC) Nameofll,f..,rrnatlon INL Education Programs System or IfPi'()ject Business Enclave Exhibit Proj.ctlUO NA NewPIA D Update [~] DOE PIA - INL Education Program Finallxw.doc N T "tl I Contact Information arne,

122

International DSM and DSM program evaluation: An INDEEP assessment  

Science Conference Proceedings (OSTI)

This paper discusses the current level of demand-side management (DSM) occurring in selected European countries and reviews the availability of information on DSM programs and program evaluation. Next, thirteen European DSM programs are compared by examining such factors as: motivations for program implementation, marketing methods, participation rates, total energy savings, and program costs. The transfer of DSM program results and experiences found in these case studies is also discussed, as well as the lessons learned during the design, implementation, and evaluation of these programs. This paper represents a preliminary assessment of the state of DSM and DSM program evaluation in Europe. The findings from this work also represent the first steps in a joint international effort to compile and analyze the measured results of energy efficiency programs in a consistent and comprehensive fashion. The authors find that these programs represent cost-effective resources: the cost of energy saved by the programs ranged from a low of 0.0005 ECUs/kWh (0.01 {cents}/kWh) to a high of 0.077 ECUs/kWh (9.7 {cents}/kWh), with an average cost of 0.027 ECUs/kWh (3.3 {cents}/kWh). Weighted by energy savings, the average cost of energy saved by the programs was 0.014 ECUs/kWh (1.8 {cents}/kWh).

Vine, E.

1995-04-01T23:59:59.000Z

123

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities IAJIT First Online Publication  

E-Print Network (OSTI)

Abstract: In order to perform the analysis and mitigation efforts related with the Information Security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts. So ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. Also in the modelling of the threat domain, attack trees are frequently utilized. However the execution of attack tree modelling is costly from the effort and timing requirements and also has inherent scalability issues. So within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined.

Bugra Karabey; Nazife Baykal

2011-01-01T23:59:59.000Z

124

Self-Assessment Program Assessment plan - Developed By NNSA/Nevada Site Office Facility Representative Division  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SELF-ASSESSMENT SELF-ASSESSMENT Assessment Plan NNSA/Nevada Site Office Independent Oversight Division Performance Objective: Management should ensure that effective management and independent self- assessments are being conducted periodically by technically qualified personnel. [10 CFR 830.122, subpart A & DOE O 414.1A, Quality Assurance] Criteria: Managers shall assess their management processes and be actively involved in the assessment process to ensure results contribute to improved performance of programs, systems, and work processes. DOE O 414.1A, Criterion 9 (a) An effective assessment and safety management program shall focus on achieving DOE/NNSA expectations through federal regulations and standards. DOE O 414.1A, Criterion 9 (a) An effective assessment supports management's goal to protect people and

125

Environmental Hazards Assessment Program annual report, [June 1992--June 1993  

SciTech Connect

This report, the Environment Hazards Assessment Program (EHAP) Annual Report, is the second of three reports that document activities under the EHAP grant and details progress made during the first year of the grant. The first year was devoted to the development of a working program implementation plan. During the developmental process some key objectives were achieved such as developing a Doctor of Philosophy degree program in Environmental Studies at MUSC (Medical University of South Carolina) and conducting the first Crossroads of Humanity series Round Table Forum. The PIP (Program Implementation Program) details the objectives, management and budgetary basis for the overall management and control of the grant over the next four years, the yearly program plans provide the monthly and day-to-day programmatic and budgetary control by which the PIP was developed.

Not Available

1993-10-01T23:59:59.000Z

126

Environmental Hazards Assessment Program. Quarterly report, January 1994--March 1994  

SciTech Connect

The objectives of the EHAP program are to: Develop a holistic, national basis for risk assessment, risk management and risk communication; Develop a pool of talented scientists and experts in cleanup activities, especially in human health aspects, and; Identify needs and develop programs addressing the critical shortage of well-educated, highly-skilled technical and scientific personnel to address the health oriented aspects of environmental restoration and waste management. This report describes activities and reports on progress for the third quarter of year two (January-March, 1994) of the grant. To better accomplish objectives, grant efforts are organized into three major elements: The Crossroads of Humanity Series; Research, Science and Education Programs; and Program Management. The Crossroads of Humanity Series charted a new course, incorporating lessons learned during previous quarters into a series of programs designed to address environmental issues in a real world setting. Reports are included on the various research programs with milestones and deliverables from the third quarter.

Not Available

1994-05-04T23:59:59.000Z

127

Environmental Assessment : Squawfish Management Program : Final.  

DOE Green Energy (OSTI)

Bonneville Power Administration (BPA) proposes to decrease the number of northern squawfish (Ptychocheilus oregonensis) in reservoirs in the Columbia River system. The goal of the Squawfish Management Program is to reduce losses of outmigrating juvenile salmon and steelhead (salmonids) to northern squawfish predation. The objective is to reduce the number of northern squawfish that feed on juvenile salmonids (smolts) by 10 to 20 percent to alter the age and size structure of the northern squawfish population. The hypothesis, based on computer modeling, indicates that sustained northern squawfish harvest (5 to 10 years) and the resultant population restructuring may reduce losses of juvenile salmonids to predation by up to 50 percent or more within 10 years. The proposed action would target northern squawfish 11 inches and longer, the size in which northern squawfish being preying significantly on juvenile salmonids. BPA proposes to fund three types of fisheries to harvest northern squawfish. BPA also proposes to fund monitoring activities of these fisheries to determine whether desired or other results occur. The three fisheries methods proposed are: (1) commercial Tribal fishing; (2) sport reward fishing; and (3) fishing from restricted areas of each dam ( dam angling''). These fisheries were tested in 1990 and 1991.

United States. Bonneville Power Administration.

1992-05-01T23:59:59.000Z

128

Guatemala-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » Guatemala-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Guatemala-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Guatemala Central America References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects

129

Self-Assessment Standard for DOE Contractor Criticality Safety Programs  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10 10 March 2010 DOE STANDARD SELF-ASSESSMENT STANDARD FOR DOE CONTRACTOR CRITICALITY SAFETY PROGRAMS DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE This document is available on the Department of Energy Technical Standards Program Web Page at http://www.hss.energy.gov/nuclearsafety/ns/techstds/ DOE-STD-1158-2010 iii TABLE OF CONTENTS FOREWORD ................................................................................................................... v ACKNOWLEDGEMENT ..................................................................................................vi DEFINITIONS ................................................................................................................ vii

130

Formerly Utilized Sites Remedial Action Program environmental compliance assessment checklists  

Science Conference Proceedings (OSTI)

The purpose of the Environmental Compliance Assessment Program is to assess the compliance of Formerly Utilized Site Remedial Action Program (FUSRAP) sites with applicable environmental regulations and Department of Energy (DOE) Orders. The mission is to identify, assess, and decontaminate sites utilized during the 1940s, 1950s, and 1960s to process and store uranium and thorium ores in support of the Manhattan Engineer District and the Atomic Energy Commission. To conduct the FUSRAP environmental compliance assessment, checklists were developed that outline audit procedures to determine the compliance status of the site. The checklists are divided in four groups to correspond to these regulatory areas: Hazardous Waste Management, PCB Management, Air Emissions, and Water Discharges.

Levine, M.B.; Sigmon, C.F.

1989-09-29T23:59:59.000Z

131

V-038: Google Chrome Two Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Google Chrome Two Vulnerabilities 8: Google Chrome Two Vulnerabilities V-038: Google Chrome Two Vulnerabilities December 3, 2012 - 1:00am Addthis PROBLEM: Google Chrome Two Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 23.0.1271.95. ABSTRACT: Two vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA51447 CVE-2012-5137 CVE-2012-5138 IMPACT ASSESSMENT: High DISCUSSION: Two vulnerabilities have been reported in Google Chrome, where one has an unknown impact and the other can be exploited by malicious people to compromise a user's system. 1) An error exists when handling file paths. 2) A use-after-free error exists when handling media sources. The vulnerabilities are reported in versions prior to 23.0.1271.95. IMPACT:

132

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Secure Gateway Unspecified Vulnerability 6: Citrix Secure Gateway Unspecified Vulnerability T-566: Citrix Secure Gateway Unspecified Vulnerability February 28, 2011 - 11:22pm Addthis PROBLEM: Citrix Secure Gateway Unspecified Vulnerability. PLATFORM: Citrix Secure Gateway version 3.1.4 ABSTRACT: A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia Advisory SA43497 Citrix Support IMPACT ASSESSMENT: High Discussion: This vulnerability only affects Secure Gateway version 3.1.4. Secure Gateway version 3.2.0 is not affected by this vulnerability, but Citrix recommends that customers currently using this version upgrade their deployments to version 3.2.1 in line with the guidance provided in

133

Empirical Estimates and Observations of 0Day Vulnerabilities  

Science Conference Proceedings (OSTI)

We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to a system from exploit of vulnerabilities which are not generally known to the public or, most importantly, to the owners of the system. Using the 0Day definition given above, we analyzed the 0Day lifespans of 491 vulnerabilities and conservatively estimated that in the worst year there were on average 2500 0Day vulnerabilities in existence on any given day. Then using a small but intriguing set of 15 0Day vulnerability lifespans representing the time from actual discovery to public disclosure, we made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day vulnerabilities in existence on any given day.

Miles A. McQueen; Trevor A. McQueen; Wayne F. Boyer; May R. Chaffin

2009-01-01T23:59:59.000Z

134

Steam Generator Management Program: Assessment of Steam Generator Tube Plugs  

Science Conference Proceedings (OSTI)

EPRI Steam Generator Management Program guidelines require that utilities perform integrity assessments of all steam generator (SG) components, including tube plugs. SG inspection outages should specifically include monitoring of degradation in tube hardware such as plugs. This report provides guidance for utility engineers to use in determining tube plug inspection requirements, including scope, technique, and periodicity.BackgroundGenerally, utilities perform ...

2013-08-28T23:59:59.000Z

135

Livermore Site Office Facility Representative Program Self-Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ARPT-LSO-2011-001 ARPT-LSO-2011-001 Site: Livermore Site Office Subject: Office of Independent Oversight's Office of Environment, Safety and Health Evaluations Activity Report for the Livermore Site Office Facility Representative Program Self-Assessment Dates of Activity 01/24/2011 - 01/28/2011 Report Preparer Robert Freeman Activity Description/Purpose: This activity report documents the results of the Office of Health, Safety and Security's (HSS) review of and participation in the Livermore Site Office Self-Assessment of the Facility Representative (FR) Program. This self-assessment was led by the U.S. Department of Energy (DOE) Livermore Site Office (LSO) and conducted by LSO staff, HSS staff, National Nuclear Security Administration (NNSA) Office of the Chief of Defense Nuclear Safety (CDNS) staff, a peer from Los Alamos Site

136

Evaluation of commercial lighting programs: A DEEP assessment  

SciTech Connect

In this paper, we present key findings from a Database on Energy Efficiency Programs (DEEP) report on commercial lighting programs. In the DEEP report, which is the first in a series, we examine the measured performance of 20 utility-sponsored, demand-side management (DSM), lighting efficiency programs in the commercial and industrial sectors. We assess the performance of the lighting programs based on four measures: the total resource costs of the programs, participation rates, energy savings per participant, and utility costs per participant. At an average cost of 3.9 C/kWh, these programs are judged to be cost-effective when compared to avoided costs in their areas. We critically examine participation rates, energy savings per participant, and utility costs per participant in order to understand precisely what aspects of program performance they measure. Finally, we summarize some of the primary difficulties in collecting DSM data in a consistent and comprehensive fashion, and offer some solutions to this challenging problem.

Vine, E.L.; Eto, J.; Shown, L.; Sonnenblick, R.; Payne, C.

1994-08-01T23:59:59.000Z

137

Assessment of US electric vehicle programs with ac powertrains  

Science Conference Proceedings (OSTI)

AC powertrain technology is a promising approach to improving the performance of electric vehicles. Four major programs are now under way in the United States to develop ac powertrains: the Ford/General Electric single-shaft electric propulsion system (ETX-II), the Eaton dual-shaft electric propulsion system (DSEP), the Jet Propulsion Laboratories (JPL) integrated ac motor drive and recharge system, and the Massachusetts Institute of Technology (MIT) variable reluctance motor (VRM) drive. The JPL program is sponsored by EPRI; the other three programs are funded by the US Department of Energy. This preliminary assessment of the four powertrain programs focuses on potential performance, costs, safety, and commercial feasibility. Interviews with program personnel were supplemented by computer simulations of electric vehicle performance using the four systems. Each of the four powertrains appears superior to standard dc powertrain technology in terms of performance and weight. The powertrain technologies studied in this assessment are at varying degrees of technological maturity. One or more of the systems may be ready for incorporation into an advanced electric vehicle during the early 1990s. Each individual report will have a separate abstract. 5 refs., 37 figs., 29 tabs.

Kevala, R.J. (Booz, Allen and Hamilton, Inc., Bethesda, MD (USA). Transportation Consulting Div.)

1990-02-01T23:59:59.000Z

138

Environmental Hazards Assessment Program. Quarterly report, July--September 1993  

SciTech Connect

The objectives of the EHAP program stated in the proposal to DOE are to: (1) develop a holistic, national basis for risk assessment, risk management, and risk communication which recognizes the direct impact of environmental hazards on the health and well-being of all, (2) develop a pool of talented scientists and experts in cleanup activities, especially in human health aspects, and (3) identify needs and develop programs addressing the critical shortage of well-educated, highly-skilled technical and scientific personnel to address the health oriented aspects of environmental restoration and waste management.

Not Available

1993-12-01T23:59:59.000Z

139

Assessing Natural Gas Energy Efficiency Programs in a Low-Price...  

NLE Websites -- All DOE Office Websites (Extended Search)

Natural Gas Energy Efficiency Programs in a Low-Price Environment Title Assessing Natural Gas Energy Efficiency Programs in a Low-Price Environment Publication Type Policy Brief...

140

T-564: Vulnerabilities in Citrix Licensing administration components |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Vulnerabilities in Citrix Licensing administration 4: Vulnerabilities in Citrix Licensing administration components T-564: Vulnerabilities in Citrix Licensing administration components February 24, 2011 - 7:00am Addthis PROBLEM: Vulnerabilities in Citrix Licensing administration components. PLATFORM: Citrix Licensing Administration Console, formerly known as the License Management Console. ABSTRACT: The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console. reference LINKS: Citrix ID:CTX128167 SecurityTracker Alert ID:1025123 Citrix Support IMPACT ASSESSMENT: Medium Discussion: Citrix has been made aware of a number of vulnerabilities in a third-party component that is used by the Citrix Licensing administration console. These vulnerabilities could potentially allow an unauthorized user to gain

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

142

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

143

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

144

T-616: PHP Stream Component Remote Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: PHP Stream Component Remote Denial of Service Vulnerability 6: PHP Stream Component Remote Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability May 5, 2011 - 12:59am Addthis PROBLEM: PHP Stream Component Remote Denial of Service Vulnerability PLATFORM: Ubuntu Linux PHP MandrakeSoft Corporate Server MandrakeSoft Enterprise Server MandrakeSoft Linux Mandrake ABSTRACT: PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable. reference LINKS: SecurityFocus IMPACT ASSESSMENT: Medium Discussion: PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this

145

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

146

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

147

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

148

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

149

Laboratory Directed Research and Development Program Assessment for FY 2007  

SciTech Connect

Brookhaven National Laboratory (BNL) is a multidisciplinary Laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal Year 2008 spending was $531.6 million. There are approximately 2,800 employees, and another 4,300 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development,' April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. To be a premier scientific Laboratory, BNL must continuously foster groundbreaking scientific research and renew its research agenda. The competition for LDRD funds stimulates Laboratory scientists to think in new and creative ways, which becomes a major factor in achieving and maintaining research excellence and a means to address National needs within the overall mission of the DOE and BNL. By fostering high-risk, exploratory research, the LDRD program helps BNL to respond new scientific opportunities within existing mission areas, as well as to develop new research mission areas in response to DOE and National needs. As the largest expense in BNL's LDRD program is the support graduate students, post-docs, and young scientists, LDRD provides base for continually refreshing the research staff as well as the education and training of the next generation of scientists. The LDRD Program Assessment Report contains a review of the program. The report includes a summary of the management processes, project peer review, and the portfolio's relatedness to BNL's mission, initiatives and strategic plans. Also included are a metric of success indicators and Self Assessment.

Looney,J.P.; Fox, K.J.

2008-03-31T23:59:59.000Z

150

SRNL PHASE 1 ASSESSMENT OF THE WTP WASTE QUALIFICATION PROGRAM  

SciTech Connect

The Hanford Tank Waste Treatment and Immobilization Plant (WTP) Project is currently transitioning its emphasis from an engineering design and construction phase toward facility completion, start-up and commissioning. With this transition, the WTP Project has initiated more detailed assessments of the requirements that must be met during the actual processing of the Hanford Site tank waste. One particular area of interest is the waste qualification program. In general, the waste qualification program involves testing and analysis to demonstrate compliance with waste acceptance criteria, determine waste processability, and demonstrate laboratory-scale unit operations to support WTP operations. The testing and analysis are driven by data quality objectives (DQO) requirements necessary for meeting waste acceptance criteria for transfer of high-level wastes from the tank farms to the WTP, and for ensuring waste processability including proper glass formulations during processing within the WTP complex. Given the successful implementation of similar waste qualification efforts at the Savannah River Site (SRS) which were based on critical technical support and guidance from the Savannah River National Laboratory (SRNL), WTP requested subject matter experts (SMEs) from SRNL to support a technology exchange with respect to waste qualification programs in which a critical review of the WTP program could be initiated and lessons learned could be shared. The technology exchange was held on July 18-20, 2011 in Richland, Washington, and was the initial step in a multi-phased approach to support development and implementation of a successful waste qualification program at the WTP. The 3-day workshop was hosted by WTP with representatives from the Tank Operations Contractor (TOC) and SRNL in attendance as well as representatives from the US DOE Office of River Protection (ORP) and the Defense Nuclear Facility Safety Board (DNFSB) Site Representative office. The purpose of the workshop was to share lessons learned and provide a technology exchange to support development of a technically defensible waste qualification program. The objective of this report is to provide a review, from SRNL's perspective, of the WTP waste qualification program as presented during the workshop. In addition to SRNL's perspective on the general approach to the waste qualification program, more detailed insight into the specific unit operations presented by WTP during the workshop is provided. This report also provides a general overview of the SRS qualification program which serves as a basis for a comparison between the two programs. Recommendations regarding specific steps are made based on the review and SRNL's lessons learned from qualification of SRS low-activity waste (LAW) and high-level waste (HLW) to support maturation of the waste qualification program leading to WTP implementation.

Peeler, D.; Hansen, E.; Herman, C.; Marra, S.; Wilmarth, B.

2012-03-06T23:59:59.000Z

151

Laboratory Directed Research and Development Program Assessment for FY 2007  

SciTech Connect

Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's Fiscal Year 2007 spending was $515 million. There are approximately 2,600 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, 'Laboratory Directed Research and Development', April 19, 2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy/National Nuclear Security Administration Laboratories dated June 13, 2006. The goals and objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new 'fundable' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research 'which could lead to new programs, projects, and directions' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas, which becomes a major factor in achieving and maintaining staff excellence and a means to address national needs within the overall mission of the DOE and BNL. The LDRD Program Assessment Report contains a review of the program. The report includes a summary of the management processes, project peer review, and the portfolio's relatedness to BNL's mission, initiatives and strategic plans. Also included are a metric of success indicators and Self Assessment.

Newman,L.; Fox, K.J.

2007-12-31T23:59:59.000Z

152

LABORATORY DIRECTED RESEARCH AND DEVELOPMENT PROGRAM ASSESSMENT FOR FY 2006.  

Science Conference Proceedings (OSTI)

Brookhaven National Laboratory (BNL) is a multidisciplinary laboratory that carries out basic and applied research in the physical, biomedical, and environmental sciences, and in selected energy technologies. It is managed by Brookhaven Science Associates, LLC, (BSA) under contract with the U. S. Department of Energy (DOE). BNL's total annual budget has averaged about $460 million. There are about 2,500 employees, and another 4,500 guest scientists and students who come each year to use the Laboratory's facilities and work with the staff. The BNL Laboratory Directed Research and Development (LDRD) Program reports its status to the U.S. Department of Energy (DOE) annually in March, as required by DOE Order 413.2B, ''Laboratory Directed Research and Development,'' April 19,2006, and the Roles, Responsibilities, and Guidelines for Laboratory Directed Research and Development at the Department of Energy National Nuclear Security Administration Laboratories dated June 13,2006. The goals and' objectives of BNL's LDRD Program can be inferred from the Program's stated purposes. These are to (1) encourage and support the development of new ideas and technology, (2) promote the early exploration and exploitation of creative and innovative concepts, and (3) develop new ''fundable'' R&D projects and programs. The emphasis is clearly articulated by BNL to be on supporting exploratory research ''which could lead to new programs, projects, and directions'' for the Laboratory. As one of the premier scientific laboratories of the DOE, BNL must continuously foster groundbreaking scientific research. At Brookhaven National Laboratory one such method is through its LDRD Program. This discretionary research and development tool is critical in maintaining the scientific excellence and long-term vitality of the Laboratory. Additionally, it is a means to stimulate the scientific community and foster new science and technology ideas, which becomes a major factor in achieving and maintaining staff excellence and a means to address national needs within the overall mission of the DOE and BNL. The LDRD Program Assessment Report contains a review of the program. The report includes a summary of the management processes, project peer review, and the portfolio's relatedness to BNL's mission, initiatives and strategic plans. Also included is a metric of success indicators and Self Assessment.

FOX,K.J.

2006-01-01T23:59:59.000Z

153

Flammability Assessment Methodology Program Phase I: Final Report  

SciTech Connect

The Flammability Assessment Methodology Program (FAMP) was established to investigate the flammability of gas mixtures found in transuranic (TRU) waste containers. The FAMP results provide a basis for increasing the permissible concentrations of flammable volatile organic compounds (VOCs) in TRU waste containers. The FAMP results will be used to modify the ''Safety Analysis Report for the TRUPACT-II Shipping Package'' (TRUPACT-II SARP) upon acceptance of the methodology by the Nuclear Regulatory Commission. Implementation of the methodology would substantially increase the number of drums that can be shipped to the Waste Isolation Pilot Plant (WIPP) without repackaging or treatment. Central to the program was experimental testing and modeling to predict the gas mixture lower explosive limit (MLEL) of gases observed in TRU waste containers. The experimental data supported selection of an MLEL model that was used in constructing screening limits for flammable VOC and flammable gas concentrations. The MLEL values predicted by the model for individual drums will be utilized to assess flammability for drums that do not meet the screening criteria. Finally, the predicted MLEL values will be used to derive acceptable gas generation rates, decay heat limits, and aspiration time requirements for drums that do not pass the screening limits. The results of the program demonstrate that an increased number of waste containers can be shipped to WIPP within the flammability safety envelope established in the TRUPACT-II SARP.

C. A. Loehr; S. M. Djordjevic; K. J. Liekhus; M. J. Connolly

1997-09-01T23:59:59.000Z

154

Assessment of the O2Diesel Operational Safety Program: December 23, 2002 -- June 30, 2007  

DOE Green Energy (OSTI)

This report assesses O2Diesel's operational safety program using its ethanol-diesel blended fuel product.

TIAX LLC

2006-06-01T23:59:59.000Z

155

Environment, Safety, and Health Risk Assessment Program (ESHRAP)  

SciTech Connect

The Environment, Safety and Health Risk Assessment Program (ESHRAP) models human safety and health risk resulting from waste management and environmental restoration activities. Human safety and health risks include those associated with storing, handling, processing, transporting, and disposing of radionuclides and chemicals. Exposures to these materials, resulting from both accidents and normal, incident-free operation, are modeled. In addition, standard industrial risks (falls, explosions, transportation accidents, etc.) are evaluated. Finally, human safety and health impacts from cleanup of accidental releases of radionuclides and chemicals to the environment are estimated. Unlike environmental impact statements and safety analysis reports, ESHRAP risk predictions are meant to be best estimate, rather than bounding or conservatively high. Typically, ESHRAP studies involve risk predictions covering the entire waste management or environmental restoration program, including such activities as initial storage, handling, processing, interim storage, transportation, and final disposal. ESHRAP can be used to support complex environmental decision-making processes and to track risk reduction as activities progress.

Eide, Steven Arvid; Thomas Wierman

2003-12-01T23:59:59.000Z

156

Self Assessment Survey - Vulnerability Assessment Team - Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

Useful Resources Useful Resources Contact the VAT Contact the VAT Other Nonproliferation & National Security Capabilities Work with Argonne Contact us For Employees Site...

157

Berlin, Maryland, district heating assessment program. Feasibility study  

DOE Green Energy (OSTI)

Ebasco conducted the technical and economic portion of this study to determine the feasibility of constructing a district heating system with a geothermal energy source for the town of Berlin, Maryland. The Berlin District Heating Assessment Work Group (DHAWG) provided the information on the energy needs of all potential users. Previous work was used to estimate the potential geothermal energy available beneath the town. A computer program, GRITS, developed by JHU was also used to evaluate various district heating systems that would satisfy the town's needs. It is concluded that a district heating system is technically and economically feasible based on the criteria and data used in this study.

Not Available

1982-09-01T23:59:59.000Z

158

ORISE 04-0115 Human Reliability Program Medical Assessments 2004  

NLE Websites -- All DOE Office Websites (Extended Search)

ORISE 04-0115 ORISE 04-0115 Office of Security U. S. Department of Energy Human Reliability Program MEDICAL ASSESSMENTS Center for Human Reliability Studies Oak Ridge Institute for Science and Education Operated by Oak Ridge Associated Universities For the U. S. Department of Energy Oak Ridge Associated Universities (ORAU) is a university consortium leveraging the scientific strength of major research institutions to advance science and education by partnering with national laboratories, government agencies, and private industry. ORAU manages the Oak Ridge Institute for Science and Education for the U.S. Department of Energy (DOE). Oak Ridge Institute for Science and Education (ORISE) is a DOE facility focusing on scientific initiatives to research health risks from occupational hazards, assess environmental cleanup, respond to radiation medical

159

Power plant system assessment. Final report. SP-100 Program  

SciTech Connect

The purpose of this assessment was to provide system-level insights into 100-kWe-class space reactor electric systems. Using these insights, Rockwell was to select and perform conceptual design studies on a ''most attractive'' system that met the preliminary design goals and requirements of the SP-100 Program. About 4 of the 6 months were used in the selection process. The remaining 2 months were used for the system conceptual design studies. Rockwell completed these studies at the end of FY 1983. This report summarizes the results of the power plant system assessment and describes our choice for the most attractive system - the Rockwell SR-100G System (Space Reactor, 100 kWe, Growth) - a lithium-cooled UN-fueled fast reactor/Brayton turboelectric converter system.

Anderson, R.V.; Atkins, D.F.; Bost, D.S.; Berman, B.; Clinger, D.A.; Determan, W.R.; Drucker, G.S.; Glasgow, L.E.; Hartung, J.A.; Harty, R.B.

1983-10-31T23:59:59.000Z

160

Plutonium Vulnerability Management Plan  

Science Conference Proceedings (OSTI)

This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

NONE

1995-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |  

NLE Websites -- All DOE Office Websites (Extended Search)

Removing Vulnerable Civilian Nuclear and Radiological Material | Removing Vulnerable Civilian Nuclear and Radiological Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material Fact Sheet GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material

162

GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |  

National Nuclear Security Administration (NNSA)

Removing Vulnerable Civilian Nuclear and Radiological Material | Removing Vulnerable Civilian Nuclear and Radiological Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material Fact Sheet GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material

163

Environmental monitoring and assessment program at potential OTEC sites  

DOE Green Energy (OSTI)

Ecologically sound operations of projected Ocean Thermal Energy Conversion (OTEC) plants can be insured by careful attention to the marine environment during the design phase. This requires quality information from regions of potential OTEC interest, coordinated with required assessment studies to insure legal compliance. Currently, preliminary or actual surveys and laboratory studies are being conducted in the waters of Puerto Rico, the Gulf of Mexico, Hawaii, and Guam for potential moored or seacoast OTEC plants and in the equatorial South Atlantic for proposed plant--ship operations to provide such benchmark and baseline data. These data plus existing archival information can be used to model effects of OTEC operations based on projected design schemes. Four major areas of concerns (1) redistribution of oceanic properties, (2) chemical pollution, (3) structural effects, and (4) socio-legal-economic; and 11 key issues associated with OTEC development and operation have been identified. In general mitigating strategies can be used to alleviate many deleterious environmental effects of operational problems as biostimulation, outgassing, etc. Various assessment research studies on toxicity, biocide releases, etc., are under way or are planned to investigate areas where no clear mitigating strategy is available. Data from the monitoring and assessment programs is being integrated into a series of environmental compliance documents including a comprehensive programmatic environmental impact assessment.

Wilde, P.

1979-06-01T23:59:59.000Z

164

Program on Technology Innovation: EPRI State of RoboticsAssessment and Proposed Strategic Program  

Science Conference Proceedings (OSTI)

Robotics technology is widely used throughout many industries and dates back almost 60 years. Although the power industry uses some robotics, much potential remains untapped. This report explains the current level of engagement within the Electric Power Research Institutes (EPRIs) robotics technology projects, assesses the need for engagement by sector, identifies technical gaps, and proposes a model for the inception of a strategic program initiative for robotics ...

2013-09-16T23:59:59.000Z

165

Final Environmental assessment for the Uranium Lease Management Program  

SciTech Connect

The US Department of Energy (DOE) has prepared a programmatic environmental assessment (EA) of the proposed action to continue leasing withdrawn lands and DOE-owned patented claims for the exploration and production of uranium and vanadium ores. The Domestic Uranium Program regulation, codified at Title 10, Part 760.1, of the US Code of Federal Regulations (CFR), gives DOE the flexibility to continue leasing these lands under the Uranium Lease Management Program (ULMP) if the agency determines that it is in its best interest to do so. A key element in determining what is in DOE`s ``best interest`` is the assessment of the environmental impacts that may be attributable to lease tract operations and associated activities. On the basis of the information and analyses presented in the EA for the ULMP, DOE has determined that the proposed action does not constitute a major Federal action significantly affecting the quality of the human environment, as defined in the National Environmental Policy Act (NEPA) of 1969 (42 United States Code 4321 et seq.), as amended.Therefore, preparation of an environmental impact statement is not required for the ULMP,and DOE is issuing this Finding, of No Significant Impact (FONSI).

NONE

1995-07-01T23:59:59.000Z

166

Technology Assessment and Roadmap for the Emergency Radiation Dose Assessment Program  

SciTech Connect

A Joint Interagency Working Group (JIWG) under the auspices of the Department of Homeland Security Office of Research and Development conducted a technology assessment of emergency radiological dose assessment capabilities as part of the overall need for rapid emergency medical response in the event of a radiological terrorist event in the United States. The goal of the evaluation is to identify gaps and recommend general research and development needs to better prepare the Country for mitigating the effects of such an event. Given the capabilities and roles for responding to a radiological event extend across many agencies, a consensus of gaps and suggested development plans was a major goal of this evaluation and road-mapping effort. The working group consisted of experts representing the Departments of Homeland Security, Health and Human Services (Centers for Disease Control and the National Institutes of Health), Food and Drug Administration, Department of Defense and the Department of Energy's National Laboratories (see appendix A for participants). The specific goals of this Technology Assessment and Roadmap were to: (1) Describe the general context for deployment of emergency radiation dose assessment tools following terrorist use of a radiological or nuclear device; (2) Assess current and emerging dose assessment technologies; and (3) Put forward a consensus high-level technology roadmap for interagency research and development in this area. This report provides a summary of the consensus of needs, gaps and recommendations for a research program in the area of radiation dosimetry for early response, followed by a summary of the technologies available and on the near-term horizon. We then present a roadmap for a research program to bring present and emerging near-term technologies to bear on the gaps in radiation dose assessment and triage. Finally we present detailed supporting discussion on the nature of the threats we considered, the status of technology today, promising emerging technologies and references for further reading.

Turteltaub, K W; Hartman-Siantar, C; Easterly, C; Blakely, W

2005-10-03T23:59:59.000Z

167

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

168

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

169

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

170

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

171

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

172

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

173

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

174

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

175

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

176

U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Bugzilla LDAP Injection and Information Disclosure 1: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities September 5, 2012 - 6:00am Addthis PROBLEM: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities PLATFORM: Bugzilla 2.x Bugzilla 3.x Bugzilla 4.x ABSTRACT: Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability reference LINKS: Bugzilla Homepage Bugzilla Security Advisory Bugtraq ID: 55349 Secunia Advisory SA50433 CVE-2012-3981 CVE-2012-4747 IMPACT ASSESSMENT: Medium Discussion: A vulnerability and a security issue have been reported, which can be exploited by malicious people to disclose potentially sensitive information and manipulate certain data. 1) Input passed via the username is not properly escaped before being used

177

V-062: Asterisk Two Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Asterisk Two Denial of Service Vulnerabilities 2: Asterisk Two Denial of Service Vulnerabilities V-062: Asterisk Two Denial of Service Vulnerabilities January 4, 2013 - 6:00am Addthis PROBLEM: Asterisk Two Denial of Service Vulnerabilities PLATFORM: The vulnerabilities are reported in versions 1.8.x, 10.x, and 11.x. ABSTRACT: Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA51689 Asterisk Project Security Advisories CVE-2012-5976 CVE-2012-5977 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to consume excessive resources on the target system. Systems configured to allow anonymous calls are affected. A remote authenticated user can also exploit this via

178

T-578: Vulnerability in MHTML Could Allow Information Disclosure |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Vulnerability in MHTML Could Allow Information Disclosure 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory (2501696) CVE-2011-0096 SecurityTracker Alert ID: 1025003 Bugtraq ID: 46055 IMPACT ASSESSMENT: Moderate Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible under certain

179

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

180

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-246: Tigase XMPP Dialback Protection Bypass Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Tigase XMPP Dialback Protection Bypass Vulnerability 6: Tigase XMPP Dialback Protection Bypass Vulnerability U-246: Tigase XMPP Dialback Protection Bypass Vulnerability August 28, 2012 - 7:00am Addthis PROBLEM: Tigase XMPP Dialback Protection Bypass Vulnerability PLATFORM: Tigase 5.x ABSTRACT: A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions. reference LINKS: XMPP Standards Foundation Secunia Advisory SA50362 tigase.org CVE-2012-4670 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the XMPP protocol implementation, which does not properly verify the "Verify Response" and "Authorization Response" messages. This can be exploited to spoof a domain and bypass the Dialback protection.

182

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

183

T-730: Vulnerability in Citrix Provisioning Services could result in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

730: Vulnerability in Citrix Provisioning Services could result 730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution T-730: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution September 29, 2011 - 8:30am Addthis PROBLEM: Vulnerability in Citrix Provisioning Services could result in Arbitrary Code Execution. PLATFORM: This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6 Service Pack 1. ABSTRACT: Citrix Provisioning Services is prone to a remote code-execution vulnerability. Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the application. reference LINKS: Citrix Document ID: CTX130846 Security Focus: Bugtraq ID 49803 IMPACT ASSESSMENT:

184

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

185

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

186

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

187

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

188

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

189

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

190

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

191

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

192

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

193

V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability 3: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability April 1, 2013 - 1:26am Addthis PROBLEM: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability PLATFORM: VMware ESX Server 4.x VMware ESXi 4.x VMware ESXi 5.x ABSTRACT: A vulnerability has been reported in VMware ESX and ESXi REFERENCE LINKS: VMware ESXi security update Secunia Advisory SA52844 CVE-2012-5134 IMPACT ASSESSMENT: High DISCUSSION: The ESXi userworld libxml2 library has been updated to resolve a security issue IMPACT: VMware ESX and ESXi can be exploited by malicious people to compromise a vulnerable system SOLUTION: The vendor has issued a fix, VMware ESXi 5.0, Patch Release ESXi500-201303001 (2044373) Addthis Related Articles U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets

194

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

195

V-001: Mozilla Security vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

196

V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Google Picasa BMP and TIFF Images Processing Vulnerabilities 6: Google Picasa BMP and TIFF Images Processing Vulnerabilities V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities March 21, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been discovered in Google Picasa PLATFORM: Google Picasa Version 3.9.0 build 136.09 for Windows/3.9.14.34 for Mac ABSTRACT: Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system. REFERENCE LINKS: Secunia Advisory SA51652 Picasa Release Notes IMPACT ASSESSMENT: High DISCUSSION: 1) A sign extension error when processing the color table of a BMP image can be exploited to cause a heap-based buffer overflow via a BMP image with a specially crafted "biBitCount" field. 2) The application bundles a vulnerable version of LibTIFF.

197

Putting vulnerability to climate change on the map: a review of approaches, benefits, and risks  

Science Conference Proceedings (OSTI)

There is growing demand among stakeholders across public and private institutions for spatially-explicit information regarding vulnerability to climate change at the local scale. However, the challenges associated with mapping the geography of climate change vulnerability are non-trivial, both conceptually and technically, suggesting the need for more critical evaluation of this practice. Here, we review climate change vulnerability mapping in the context of four key questions that are fundamental to assessment design. First, what are the goals of the assessment? A review of published assessments yields a range of objective statements that emphasize problem orientation or decision-making about adaptation actions. Second, how is the assessment of vulnerability framed? Assessments vary with respect to what values are assessed (vulnerability of what) and the underlying determinants of vulnerability that are considered (vulnerability to what). The selected frame ultimately influences perceptions of the primary driving forces of vulnerability as well as preferences regarding management alternatives. Third, what are the technical methods by which an assessment is conducted? The integration of vulnerability determinants into a common map remains an emergent and subjective practice associated with a number of methodological challenges. Fourth, who participates in the assessment and how will it be used to facilitate change? Assessments are often conducted under the auspices of benefiting stakeholders, yet many lack direct engagement with stakeholders. Each of these questions is reviewed in turn by drawing on an illustrative set of 45 vulnerability mapping studies appearing in the literature. A number of pathways for placing vulnerability

Preston, Benjamin L [ORNL

2011-01-01T23:59:59.000Z

198

A Regional Climate Change Assessment Program for North America  

SciTech Connect

There are two main uncertainties in determining future climate: the trajectories of future emissions of greenhouse gases and aerosols, and the response of the global climate system to any given set of future emissions [Meehl et al., 2007]. These uncertainties normally are elucidated via application of global climate models, which provide information at relatively coarse spatial resolutions. Greater interest in, and concern about, the details of climate change at regional scales has provided the motivation for the application of regional climate models, which introduces additional uncertainty [Christensen et al., 2007a]. These uncertainties in fi ne- scale regional climate responses, in contrast to uncertainties of coarser spatial resolution global models in which regional models are nested, now have been documented in numerous contexts [Christensen et al., 2007a] and have been found to extend to uncertainties in climate impacts [Wood et al., 2004; Oleson et al., 2007]. While European research in future climate projections has moved forward systematically to examine combined uncertainties from global and regional models [Christensen et al., 2007b], North American climate programs have lagged behind. To fi ll this research gap, scientists developed the North American Regional Climate Change Assessment Program (-NARCCAP). The fundamental scientifi c motivation of this international program is to explore separate and combined uncertainties in regional projections of future climate change resulting from the use of multiple atmosphere- ocean general circulation models (AOGCMs) to drive multiple regional climate models (RCMs). An equally important, and related, motivation for this program is to provide the climate impacts and adaptation community with high- resolution regional climate change scenarios that can be used for studies of the societal impacts of climate change and possible adaptation strategies.

Mearns, L. O.; Gutowski, William; Jones, Richard; Leung, Lai-Yung R.; McGinnis, Seth; Nunes, A.; Qian, Yun

2009-09-08T23:59:59.000Z

199

Better Buildings Neighborhood Program: Step 1: Assess the Market  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency and Renewable Energy EERE Home | Programs & Offices | Consumer Information Better Buildings Neighborhood Program Search Search Help Better Buildings...

200

National Acid Precipitation Assessment Program Report to Congress: An Integrated Assessment  

SciTech Connect

Under Title IX of the 1990 Clean Air Act Amendments, Congress reauthorized the National Acid Precipitation Assessment Program (NAPAP) to continue coordinating acid rain research and monitoring, as it had done during the previous decade, and to provide Congress with periodic reports. In particular, Congress asked NAPAP to assess all available data and information to answer two questions: (1) What are the costs, benefits, and effectiveness of Title IV? This question addresses the costs and economic impacts of complying with the Acid Rain Program as well as benefit analyses associated with the various human health and welfare effects, including reduced visibility, damages to materials and cultural resources, and effects on ecosystems. (2) What reductions in deposition rates are needed to prevent adverse ecological effects? This complex questions addresses ecological systems and the deposition levels at which they experience harmful effects. The results of the assessment of the effects of Title IV and of the relationship between acid deposition rates and ecological effects were to be reported to Congress quadrennially, beginning with the 1996 report to Congress. The objective of this Report is to address the two main questions posed by Congress and fully communicate the results of the assessment to decision-makers. Given the primary audience, most of this report is not written as a technical document, although information supporting the conclusions is provided along with references.

Uhart, M.; et al.

2005-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Vulnerability due to Nocturnal Tornadoes  

Science Conference Proceedings (OSTI)

This study investigates the human vulnerability caused by tornadoes that occurred between sunset and sunrise from 1880 to 2007. Nocturnal tornadoes are theorized to enhance vulnerability because they are difficult to spot and occur when the ...

Walker S. Ashley; Andrew J. Krmenec; Rick Schwantes

2008-10-01T23:59:59.000Z

202

System Assurance: Beyond Detecting Vulnerabilities, 1st edition  

Science Conference Proceedings (OSTI)

In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable ...

Nikolai Mansourov; Djenana Campara

2010-12-01T23:59:59.000Z

203

UNIVERSITY OF KANSAS BACCALAUREATE SOCIAL WORK PROGRAM ASSESSMENT OF STUDENT LEARNING OUTCOMES  

E-Print Network (OSTI)

UNIVERSITY OF KANSAS BACCALAUREATE SOCIAL WORK PROGRAM ASSESSMENT OF STUDENT LEARNING OUTCOMES LAST COMPLETED ON (July 12, 2012) All Council on Social Work Education programs measure and report student. A measurement benchmark is set by the social work programs for each competency. An assessment score at or above

Peterson, Blake R.

204

Field Assessment of Energy Audit Tools for Retrofit Programs  

SciTech Connect

This project focused on the use of home energy ratings as a tool to promote energy retrofits in existing homes. A home energy rating provides a quantitative appraisal of a home's asset performance, usually compared to a benchmark such as the average energy use of similar homes in the same region. Home rating systems can help motivate homeowners in several ways. Ratings can clearly communicate a home's achievable energy efficiency potential, provide a quantitative assessment of energy savings after retrofits are completed, and show homeowners how they rate compared to their neighbors, thus creating an incentive to conform to a social standard. An important consideration is how rating tools for the retrofit market will integrate with existing home energy service programs. For residential programs that target energy savings only, home visits should be focused on key efficiency measures for that home. In order to gain wide adoption, a rating tool must be easily integrated into the field process, demonstrate consistency and reasonable accuracy to earn the trust of home energy technicians, and have a low monetary cost and time hurdle for homeowners. Along with the Home Energy Score, this project also evaluated the energy modeling performance of SIMPLE and REM/Rate.

Edwards, J.; Bohac, D.; Nelson, C.; Smith, I.

2013-07-01T23:59:59.000Z

205

Field Assessment of Energy Audit Tools for Retrofit Programs  

SciTech Connect

This project focused on the use of home energy ratings as a tool to promote energy retrofits in existing homes. A home energy rating provides a quantitative appraisal of a home's asset performance, usually compared to a benchmark such as the average energy use of similar homes in the same region. Home rating systems can help motivate homeowners in several ways. Ratings can clearly communicate a home's achievable energy efficiency potential, provide a quantitative assessment of energy savings after retrofits are completed, and show homeowners how they rate compared to their neighbors, thus creating an incentive to conform to a social standard. An important consideration is how rating tools for the retrofit market will integrate with existing home energy service programs. For residential programs that target energy savings only, home visits should be focused on key efficiency measures for that home. In order to gain wide adoption, a rating tool must be easily integrated into the field process, demonstrate consistency and reasonable accuracy to earn the trust of home energy technicians, and have a low monetary cost and time hurdle for homeowners. Along with the Home Energy Score, this project also evaluated the energy modeling performance of SIMPLE and REM/Rate.

Edwards, J.; Bohac, D.; Nelson, C.; Smith, I.

2013-07-01T23:59:59.000Z

206

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mac RealPlayer Multiple Vulnerabilities 2: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

207

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: Mac RealPlayer Multiple Vulnerabilities 42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

208

Security Automation and the National Vulnerability Database  

Science Conference Proceedings (OSTI)

... 6 Page 7. National Vulnerability Database Role Receive CVE ... Environmental Integrity ... Use Case: Vulnerability Management CVE 2012-3544 30 ...

2013-06-05T23:59:59.000Z

209

Sandia Site Office Technical Qualification Program Self Assessment Report, October 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program Self Assessment Report Technical Qualification Program Self Assessment Report ASRP-N0-10.2.2012-469406 Title : Sandia Site Office Technical Qualification Program Self Assessment Lead Assessor: James Todd, SSO FTCP Agent Team Members: Shirley Ireland, Dave Rast, Wendy Sawyer, and Allen Tate Self assessnnent ASM-N0-9.13.2012-464813 Number: Dates Conducted: 9/17 -10/12, 2012 Self Asse;ssment Scope This self assessment examined how Sandia Site Office (SSO) executes the Technical Qualification Program (TQP) as measured by the current Federal Technical Capability Panel criteria review and approach documents (CRADs) included in the assessment plan. Self Asse.ssment Summary The Sandia Site Office Technical Qualification Program is implemented. Site office technical personnel responsible for providing assistance, guidance, direction, or oversight that could affect

210

Actinide partitioning-transmutation program final report. I. Overall assessment  

SciTech Connect

This report is concerned with an overall assessment of the feasibility of and incentives for partitioning (recovering) long-lived nuclides from fuel reprocessing and fuel refabrication plant radioactive wastes and transmuting them to shorter-lived or stable nuclides by neutron irradiation. The principal class of nuclides considered is the actinides, although a brief analysis is given of the partitioning and transmutation (P-T) of /sup 99/Tc and /sup 129/I. The results obtained in this program permit us to make a comparison of the impacts of waste management with and without actinide recovery and transmutation. Three major conclusions concerning technical feasibility can be drawn from the assessment: (1) actinide P-T is feasible, subject to the acceptability of fuels containing recycle actinides; (2) technetium P-T is feasible if satisfactory partitioning processes can be developed and satisfactory fuels identified (no studies have been made in this area); and (3) iodine P-T is marginally feasible at best because of the low transmutation rates, the high volatility, and the corrosiveness of iodine and iodine compounds. It was concluded on the basis of a very conservative repository risk analysis that there are no safety or cost incentives for actinide P-T. In fact, if nonradiological risks are included, the short-term risks of P-T exceed the long-term benefits integrated over a period of 1 million years. Incentives for technetium and iodine P-T exist only if extremely conservative long-term risk analyses are used. Further RD and D in support of P-T is not warranted.

Croff, A.G.; Blomeke, J.O.; Finney, B.C.

1980-06-01T23:59:59.000Z

211

Water Power Program: Marine and Hydrokinetic Resource Assessment...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

the Tidal Streams Resource Map. Tidal Streams Resource Assessment The Assessment of the Energy Production from Tidal Streams in the United States report, created by Georgia Tech,...

212

U-174: Serendipity Unspecified SQL Injection Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Serendipity Unspecified SQL Injection Vulnerability 4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL Injection Vulnerability PLATFORM: 1.6.1 and prior versions ABSTRACT: A vulnerability was reported in Serendipity. A remote user can inject SQL commands. Reference Links: SecurityTracker Alert ID: 1027079 Secunia Advisory SA49234 CVE-2012-2762 IMPACT ASSESSMENT: Medium Discussion: The 'include/functions_trackbacks.inc.php' script does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database. Impact: A remote user can execute SQL commands on the underlying database. Solution: The vendor has issued a fix (1.6.2).

213

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

214

T-625: Opera Frameset Handling Memory Corruption Vulnerability | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Opera Frameset Handling Memory Corruption Vulnerability 5: Opera Frameset Handling Memory Corruption Vulnerability T-625: Opera Frameset Handling Memory Corruption Vulnerability May 18, 2011 - 3:05pm Addthis PROBLEM: A vulnerability has been reported in Opera, which can be exploited by malicious people to compromise a user's system. PLATFORM: Opera versions prior to 11.11 ABSTRACT: The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page. reference LINKS: Secunia Advisory: SA44611 Opera Knowledge Base Opera 11.11 for Windows Opera Download Opera Mobile IMPACT ASSESSMENT: High Discussion: Framesets allow web pages to hold other pages inside them. Certain frameset constructs are not handled correctly when the page is unloaded, causing a

215

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

216

V-173: Plesk 0-Day Vulnerability | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Plesk 0-Day Vulnerability 3: Plesk 0-Day Vulnerability V-173: Plesk 0-Day Vulnerability June 7, 2013 - 6:00am Addthis PROBLEM: There is a command injection vulnerability in Plesk which is currently being exploited in the wild PLATFORM: Plesk versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro SIB isc.sans.edu Paritynews.com slashdot.org IMPACT ASSESSMENT: High DISCUSSION: The exploit makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. The exploit code published calls the PHP interpreter directly with allow_url_include=on, safe_mode=off and suhosin.simulation=on arguments.

217

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code Injection Vulnerability. PLATFORM: IM Manager versions prior to 8.4.18 are affected. ABSTRACT: Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. referecnce LINKS: Symantec Security Advisory SYM11-012 Symantec Security Updates Bugtraq ID: 49742 IMPACT ASSESSMENT: High Discussion: Symantec was notified of Cross-Site Scripting and Code injection/execution issues present in the Symantec IM Manager management console. The management console fails to properly filter/validate external inputs. Successful exploitation of SQL Injection or Remote Code execution might

218

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

219

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Symantec Endpoint Protection Manager Buffer Overflow 2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

220

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

82: Symantec Endpoint Protection Manager Buffer Overflow 82: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

222

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

223

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

224

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

225

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

226

V-173: Plesk 0-Day Vulnerability | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Plesk 0-Day Vulnerability 3: Plesk 0-Day Vulnerability V-173: Plesk 0-Day Vulnerability June 7, 2013 - 6:00am Addthis PROBLEM: There is a command injection vulnerability in Plesk which is currently being exploited in the wild PLATFORM: Plesk versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro SIB isc.sans.edu Paritynews.com slashdot.org IMPACT ASSESSMENT: High DISCUSSION: The exploit makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. The exploit code published calls the PHP interpreter directly with allow_url_include=on, safe_mode=off and suhosin.simulation=on arguments.

227

Corrective Action Plan for INEL low-level waste management ES&H vulnerabilities  

SciTech Connect

Low-level waste (LLW) activities at INEL include numerous waste generators, storage facilities, three treatment facilities, and one disposal facility. The Working Group Assessment Team (WGAT) conducted an assessment of the LLW management program in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-2 (Conformance with Safety Standards at Department of Energy Low-Level Nuclear Waste and Disposal Facilities). Assessment included review of waste generators, liquid effluent treatment, storage facilities and practices, and a disposal facility with vaults and a shallow subsurface burial site. WGAT reviewed relevant documents and conducted tours concerning these LLW operations. The vulnerabilities identified by WGAT were similar to those self-identified by INEL (storage and disposal of LLW). This assessment resulted in the documentation of 8 vulnerabilities and 3 conditions. WGAT assessed the overall LLW/mixed low-level waste (MLLW) management program at INEL as being generally effective. As recommended by DNFSB, a site-specific Corrective Action Plan has been prepared and constitutes the initial site improvement activities.

1996-07-01T23:59:59.000Z

228

Environmental Assessment for the Proposed Los Alamos National Laboratory Trails Management Program, Los Alamos, New Mexico  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 31 Environmental Assessment for the Proposed Los Alamos National Laboratory Trails Management Program, Los Alamos, New Mexico September 2, 2003 Department of Energy National Nuclear Security Administration Los Alamos Site Office Environmental Assessment for the Proposed LANL Trails Management Program DOE LASO September 2, 2003 iii Contents Acronyms and Terms................................................................................................................................vii Executive Summary ...................................................................................................................................ix 1.0 Purpose and Need ..............................................................................................................................1

229

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

230

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

231

U-234: Oracle MySQL User Login Security Bypass Vulnerability | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

234: Oracle MySQL User Login Security Bypass Vulnerability 234: Oracle MySQL User Login Security Bypass Vulnerability U-234: Oracle MySQL User Login Security Bypass Vulnerability August 14, 2012 - 7:00am Addthis PROBLEM: Oracle MySQL User Login Security Bypass Vulnerability PLATFORM: Version(s): prior to 5.1.63 and 5.5.25 are vulnerable. ABSTRACT: Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions. REFERENCE LINKS: http://www.securityfocus.com/bid/53911/discuss CVE-2012-2122 IMPACT ASSESSMENT: Medium Discussion: Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in

232

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

233

Evaluation of Commercial Lighting Programs: A DEEP Assessment  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency Program and Market Trends High Technology and Industrial Buildings Lighting Systems Residential Buildings Simulation Tools Sustainable Federal Operations Windows...

234

Low Dose Radiation Research Program: Assessing Biological Function...  

NLE Websites -- All DOE Office Websites (Extended Search)

Livermore National Laboratory under contract No. W-7405-ENG-48 and funded by the Low Dose Radiation Research Program, Biological and Environmental Research (BER), U.S....

235

Nonproliferation and National Security Program - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Major Programs > Nonproliferation and Major Programs > Nonproliferation and National Security Program Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program (NPNS)

236

Technical Qualification Program Self-Assessment Report - Y-12 Site Office |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program Self-Assessment Report - Y-12 Site Technical Qualification Program Self-Assessment Report - Y-12 Site Office Technical Qualification Program Self-Assessment Report - Y-12 Site Office The National Nuclear Security Administration Y-12 Site Office (YSO) has successfully implemented a Technical Qualification Program (YSO TQP) that produces highly qualified, technical individuals to execute oversight of site activities and support the site missions. The YSO management team considers the YSO TQP to be a significant factor by which the YSO personnel perform their jobs and support the site missions. YSO TQP Self-Assessment, July 2010 More Documents & Publications Technical Qualification Program Reaccreditation Report - Y-12 Site Office Independent Activity Report, Savannah River Operation - June 2010

237

Environmental hazards assessment program. Annual report, July 1, 1994--June 30, 1995  

SciTech Connect

This report describes activities and reports on progress for the third year of the DOE grant to support the Environmental Hazards Assessment Program (EHAP). It reports progress against grant objectives and the Program Implementation Plan published at the end of the first year of the grant. As the program has evolved, more projects have been funded and many existing projects have become more complex. Thus, to accomplish better the objectives over the years and retain a solid focus on the total mission, we have reorganized the grant effort from three to five majoe elements: Public and professional outreach; Clinical programs; Science programs; Information systems; and, Program management.

NONE

1995-07-31T23:59:59.000Z

238

ProgramTopics Resource assessment | Open Energy Information  

Open Energy Info (EERE)

Assessments + BioPower Atlas and BioFuels Atlas + Bioenergy KDF + Biomass Energy Data Book + Biomass Scenario Model + Building Component Library + CLIMWAT 2.0 + Previous Results...

239

ENVIRONMENTAL MONITORING AND ASSESSMENT PROGRAM AT POTENTIAL OTEC SITES  

E-Print Network (OSTI)

assessment Ocean Thermal Energy Conversion (OTEC) programthe 6th Annual Ocean Thermal Energy Conversion Conference,of projected Ocean Thermal Energy Conversion (OTEC) plants

Wilde, P.

2010-01-01T23:59:59.000Z

240

Assessment of the Emergency Management Program Training and Drills...  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report of the Assessment of the Emergency Management...

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Costa Rica-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Costa Rica-UNEP Risoe Technology Needs Assessment Program Costa Rica-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Costa Rica-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Costa Rica Central America References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

242

Vietnam-UNEP Risoe-Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Vietnam-UNEP Risoe-Technology Needs Assessment Program Vietnam-UNEP Risoe-Technology Needs Assessment Program Jump to: navigation, search Name Vietnam-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Vietnam South-Eastern Asia References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

243

Ivory Coast-UNEP Risoe Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Ivory Coast-UNEP Risoe Technology Needs Assessment Program Ivory Coast-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Ivory Coast-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Ivory Coast Western Africa References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview "Technology needs assessment (TNA) is a set of country-driven activities that identifies and determines the mitigation and adaptation technology

244

Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)  

SciTech Connect

The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

2013-02-01T23:59:59.000Z

245

Assessment of Building Energy-Saving Policies and Programs in China During the 11th Five Year Plan  

E-Print Network (OSTI)

of Architectural Energy-Saving in China. http://Assessment of Building Energy- Saving Policies and Programsi Assessment of Building Energy-Saving Policies and Programs

Zhou, Nan

2011-01-01T23:59:59.000Z

246

Program Review - Geothermal Exploration and Assessment Technology Program; Including a Report of the Reservoir Engineering Technical Advisory Group  

DOE Green Energy (OSTI)

In 1978, The Division of Geothermal Energy of the Department of Energy established the Geothermal Exploration and Assessment Technology Program. The purpose of this program is to ''provide assistance to the Nation's industrial community by helping to remove technical and associated economic barriers which presently inhibit efforts to bring geothermal electric power production and direct heat application on line''. In the near term this involves the adaptation of exploration and assessment techniques from the mineral and petroleum industry to geothermal applications. In the near to far term it involves the development of new technology which will improve the cost effectiveness of geothermal exploration.

Nielson, Dennis L., ed.

1979-12-01T23:59:59.000Z

247

Evaluation of Commercial Lighting Programs: A DEEP Assessment  

NLE Websites -- All DOE Office Websites (Extended Search)

DEEP report, which is the first in a series, we examine the measured performance of 20 utility-sponsored, demand-side management (DSM), lighting efficiency programs in the...

248

ENVIRONMENTAL MONITORING AND ASSESSMENT PROGRAM AT POTENTIAL OTEC SITES  

E-Print Network (OSTI)

conducted in the waters of Puerto Rico, the Gulf of Mexico,coast (OTEC-1 site); o Puerto Rico - one site near PuntaHawaii, Gulf of Mexico, and Puerto Rico - a program has been

Wilde, P.

2010-01-01T23:59:59.000Z

249

Variational Objective Analysis for Atmospheric Field Programs: A Model Assessment  

Science Conference Proceedings (OSTI)

The objective of this study is to examine the effectiveness of the variational objective analysis (VOA) for producing realistic diagnoses of atmospheric field program data. Simulations from the Naval Research Laboratory's Coupled Ocean/Atmosphere ...

D. E. Waliser; J. A. Ridout; S. Xie; M. Zhang

2002-12-01T23:59:59.000Z

250

Nuclear proliferation and civilian nuclear power. Report of the Nonproliferation Alternative Systems Assessment Program. Volume I. Program summary  

SciTech Connect

This report summarizes the Nonproliferation Alternative Systems Assessment Program (NASAP): its background, its studies, and its results. The introductory chapter traces the growth of the issue of nuclear weapons proliferation and the organization and objectives of NASAP. Chapter 2 summarizes the program's assessments, findings, and recommendations. Each of Volumes II-VII reports on an individual assessment (Volumn II: Proliferation Resistance; Volume III: Resources and Fuel Cycle Facilities; Volume IV: Commercial Potential; Volume V: Economics and Systems Analysis; Volume VI: Safety and Environmental Considerations for Licensing; Volume VII: International Perspectives). Volume VIII (Advanced Concepts) presents a combined assessment of several less fully developed concepts, and Volume IX (Reactor and Fuel Cycle Descriptions) provides detailed descriptions of the reactor and fuel-cycle systems studied by NASAP.

Not Available

1980-06-01T23:59:59.000Z

251

Modular Accident Analysis Program (MAAP5) Applications Assessment  

Science Conference Proceedings (OSTI)

The Modular Accident Analysis Program (MAAP) is widely used throughout North America, Europe, and the Far East to analyze plant responses over a broad spectrum of potential accident conditions. The use of MAAP continues to increase because its representation of integral plant response and short run times make this program ideal for supporting engineering evaluations. With greater use, however, the level of detail to be represented within the reactor core, reactor coolant system (RCS), and containment has...

2005-12-08T23:59:59.000Z

252

Safety System Oversight Program Assessment Criteria and Review Approach Document (CRAD), Revision 0  

NLE Websites -- All DOE Office Websites (Extended Search)

of 7 of 7 Safety System Oversight (SSO) Program Implementation Assessment Criteria and Review Approach Documents (CRADs) Revision 0 PROGRAM (PGM) OBJECTIVE PGM.1 An effective SSO Program is established by the Field Element Manager to apply engineering expertise to maintain safety system configuration and to assess system condition and effectiveness of safety management program implementation. Criteria PGM.1.1 The SSO Qualification Program is part of the Technical Qualification Program (DOE M 426.1-1A, Chapter III, Section 1, 2.b (1)). PGM.1.2 The SSO Program establishes appropriate training, qualification, and performance requirements for SSO personnel and the supervisors are held accountable for achieving them (DOE M 426.1-1A, Chapter III, Section 1, 2.b

253

T-547: Microsoft Windows Human Interface Device (HID) Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

547: Microsoft Windows Human Interface Device (HID) Vulnerability 547: Microsoft Windows Human Interface Device (HID) Vulnerability T-547: Microsoft Windows Human Interface Device (HID) Vulnerability February 1, 2011 - 3:20am Addthis PROBLEM Microsoft Windows Human Interface Device (HID) Vulnerability. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. reference LINKS: Security Lab: Reference CVE-2011-0638 CVE Details: Reference CVE-2011-0638 Mitre Reference: CVE-2011-0638

254

Training Program EOC0012 Consequence Assessment Team Training  

NLE Websites -- All DOE Office Websites (Extended Search)

12 12 Consequence Assessment Team Training COURSE SYLLABUS Subject Category: Emergency Operations Schedule: N/A (online) Course Length: Approximately 1 hour Medical Approval: None Delivery Method: Online - offered through the Emergency Operations Training Academy (EOTA) http://eota.doeal.gov/ Location: N/A (online) Course Prerequisite: None Retraining/Recertification: Annually recommended Course Purpose: Designed as an orientation for members of the Emergency Operations Center (EOC) Consequence Assessment team who would be called upon to provide Hazard and Consequence and Meteorological data to assist in planning and response efforts. Course Objectives: The goal of this training is to serve as an orientation to consequence assessment. Students will identify the objectives

255

Vulnerability Analysis of Energy Delivery Control Systems  

Energy.gov (U.S. Department of Energy (DOE))

The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides...

256

NSTB Summarizes Vulnerable Areas | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. NSTB Summarizes Vulnerable Areas More Documents & Publications...

257

Program on Technology Innovation: EPRI Workshop on Radiofrequency Exposure Assessment  

Science Conference Proceedings (OSTI)

EPRIs Radiofrequency (RF) Exposure Assessment Workshopheld October 18, 2012, in Washington, D.C.brought together experts in the area of RF emission characterization, instrumentation, exposure assessment, and epidemiology. The main goal of the workshop was to develop a roadmap for a future study to characterize the RF exposure pattern in the human population and determine, if possible, the contribution of various sources and environments to the overall exposure. As a result, the ...

2013-06-10T23:59:59.000Z

258

Senegal-UNEP Risoe-Technology Needs Assessment Program | Open Energy  

Open Energy Info (EERE)

Senegal-UNEP Risoe-Technology Needs Assessment Program Senegal-UNEP Risoe-Technology Needs Assessment Program Jump to: navigation, search Name Senegal-UNEP Risoe-Technology Needs Assessment Program Agency/Company /Organization --Sean Esterly (talk) 13:29"--Sean Esterly (talk) 13:29" cannot be used as a page name in this wiki., 31 December 2013 (MST)UNEP-Risoe Centre Sector Energy Topics Background analysis, Low emission development planning, -Roadmap, Pathways analysis Website http://tech-action.org/ Country Senegal Western Africa References UNEP Risoe-Technology Needs Assessment Program[1] Abstract UNEP DTIE in collaboration with the UNEP Risoe Centre will provide targeted financial, technical and methodological support to assist a total of 35 to 45 countries to conduct TNA projects Overview

259

The North American Regional Climate Change Assessment Program: Overview of Phase I Results  

Science Conference Proceedings (OSTI)

The North American Regional Climate Change Assessment Program (NARCCAP) is an international effort designed to investigate the uncertainties in regional-scale projections of future climate and produce highresolution climate change scenarios using multiple ...

Linda O. Mearns; Ray Arritt; Sbastien Biner; Melissa S. Bukovsky; Seth McGinnis; Stephan Sain; Daniel Caya; James Correia Jr.; Dave Flory; William Gutowski; Eugene S. Takle; Richard Jones; Ruby Leung; Wilfran Moufouma-Okia; Larry McDaniel; Ana M. B. Nunes; Yun Qian; John Roads; Lisa Sloan; Mark Snyder

2012-09-01T23:59:59.000Z

260

[Environmental Hazards Assessment Program annual report, June 1992--June 1993]. Environmental risk management Advisory Committee handbook  

SciTech Connect

This Handbook contains information about the objectives of the Environmental Hazards Assessment Program, the make-up of the Advisory Committee and Advisory Committee procedures. Functions of the Advisory Committee are outlined, along with guidelines for meetings and establishing agendas.

Not Available

1993-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Geothermal direct heat program: roundup technical conference proceedings. Volume II. Bibliography of publications. State-coupled geothermal resource assessment program  

DOE Green Energy (OSTI)

Lists of publications are presented for the Geothermal Resource Assessment Program for the Utah Earth Science Laboratory and the following states: Alaska, Arizona, California, Colorado, Hawaii, Idaho, Kansas, Montana, Nebraska, Nevada, New Mexico, New York, North Dakota, Oregon, Texas, Utah, and Washington.

Ruscetta, C.A. (ed.)

1982-07-01T23:59:59.000Z

262

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

263

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

264

V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and e.g. create or read arbitrary files within or outside the webroot. 2) An error when validating file names within the file renaming functionality can be exploited to bypass the denied file extensions check

265

Energy Spending and Vulnerable Households  

E-Print Network (OSTI)

offthanbefore.Inparticularlargehouseholdswithlow incomesseemtohavebeenadverselyaffectedbythenewtariffstructuressince theyhavecomparablylargeenergyexpenditure(Bennetetal.,2002). 5. VulnerableHouseholdsandEnergySpending The... tariffscanplayanimportantpartinthepublicdebate on eradicating fuel poverty and helping the vulnerable households. Smart metering can provide consumers with information on the actual energy consumptionandmight lead to...

Jamasb, Tooraj; Meier, Helena

2011-01-26T23:59:59.000Z

266

DOE site performance assessment activities. Radioactive Waste Technical Support Program  

Science Conference Proceedings (OSTI)

Information on performance assessment capabilities and activities was collected from eight DOE sites. All eight sites either currently dispose of low-level radioactive waste (LLW) or plan to dispose of LLW in the near future. A survey questionnaire was developed and sent to key individuals involved in DOE Order 5820.2A performance assessment activities at each site. The sites surveyed included: Hanford Site (Hanford), Idaho National Engineering Laboratory (INEL), Los Alamos National Laboratory (LANL), Nevada Test Site (NTS), Oak Ridge National Laboratory (ORNL), Paducah Gaseous Diffusion Plant (Paducah), Portsmouth Gaseous Diffusion Plant (Portsmouth), and Savannah River Site (SRS). The questionnaire addressed all aspects of the performance assessment process; from waste source term to dose conversion factors. This report presents the information developed from the site questionnaire and provides a comparison of site-specific performance assessment approaches, data needs, and ongoing and planned activities. All sites are engaged in completing the radioactive waste disposal facility performance assessment required by DOE Order 5820.2A. Each site has achieved various degrees of progress and have identified a set of critical needs. Within several areas, however, the sites identified common needs and questions.

Not Available

1990-07-01T23:59:59.000Z

267

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

268

T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Google SketchUp v8.x - '.DAE' File Memory Corruption 6: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 14, 2011 - 9:28am Addthis PROBLEM: Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. PLATFORM: Google SketchUp 8 is vulnerable; other versions may also be affected. ABSTRACT: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability reference LINKS: Vulnerability-Lab SketchUp Downloads IMPACT ASSESSMENT: Medium Discussion: A Memory Corruption vulnerability is detected on the Google s SketchUp v8.x. The vulnerability is caused by an memory corruption when processing corrupt DAE files through the filter, which could be exploited by attackers

269

V-070: Apache CouchDB Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache CouchDB Multiple Vulnerabilities 0: Apache CouchDB Multiple Vulnerabilities V-070: Apache CouchDB Multiple Vulnerabilities January 16, 2013 - 1:00am Addthis PROBLEM: Apache CouchDB Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.0.4, 1.1.2, and 1.2.1. ABSTRACT: Multiple vulnerabilities have been reported in Apache CouchDB REFERENCE LINKS: Secunia Advisory SA51765 Seclists.org/fulldisclosure/2013/Jan/80 Seclists.org/fulldisclosure/2013/Jan/81 Seclists.org/fulldisclosure/2013/Jan/82 CVE-2012-5641 CVE-2012-5649 CVE-2012-5650 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Apache CouchDB, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. 1) Input passed via the query parameters to browser-based test suite is not

270

V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability 7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability July 11, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Adobe ColdFusion PLATFORM: The vulnerability is reported in version 10 for Windows, Macintosh, and Linux ABSTRACT: The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets REFERENCE LINKS: Secunia Advisory SA54024 Adobe Security Bulletin APSB13-19 Stackoverflow.com CVE-2013-3350 IMPACT ASSESSMENT: High DISCUSSION: The hotfix resolves a vulnerability that could permit an attacker to invoke public methods on ColdFusion Components (CFC) using WebSockets IMPACT: Security Bypass

271

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

272

U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Cisco Linksys WMB54G TFTP Command Injection Vulnerability 18: Cisco Linksys WMB54G TFTP Command Injection Vulnerability U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability July 23, 2012 - 6:49am Addthis PROBLEM: Cisco Linksys WMB54G TFTP Command Injection Vulnerability PLATFORM: Cisco Linksys WMB54G 1.x ABSTRACT: System access from local network reference LINKS: Bugtraq ID: 54615 Original Advisory Secunia Advisory SA49868 Cisco Advisory ID: cisco-sa-20111019-cs IMPACT ASSESSMENT: Medium Discussion: A vulnerability in Cisco Linksys WMB54G was reported, which can be exploited by malicious people to compromise a vulnerable device. The vulnerability is caused due to missing input validation in the TFTP service when running the firmware update functionality and can be exploited to inject and execute arbitrary shell commands. Additionally, it may be

273

U-099: MySQL Unspecified Code Execution Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: MySQL Unspecified Code Execution Vulnerability 099: MySQL Unspecified Code Execution Vulnerability U-099: MySQL Unspecified Code Execution Vulnerability February 9, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in MySQL, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: MySQL 5.x ABSTRACT: Successful exploitation allows execution of arbitrary code. Reference LINKS: Secunia Advisory SA47894 No CVE references currently available. IMPACT ASSESSMENT: Medium Discussion: The vulnerability is reported in version 5.5.20. Other versions may also be affected. The exploit has been tested with mysql-5.5.20-debian6.0-i686.deb on Debian 6.0. Impact: System access from local network Solution: An effective workaround cannot currently be provided due to limited vulnerability details.

274

V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: RealPlayer MP4 Processing Buffer Overflow Vulnerability 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when processing MP4 files and can be exploited to cause a heap-based buffer overflow via a specially crafted MP4 file. IMPACT: Successful exploitation may allow execution of arbitrary code. SOLUTION: Update to version 16.0.1.18. Addthis Related Articles U-042: Mac RealPlayer Multiple Vulnerabilities V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

275

Program on Technology Innovation: Next Generation Monitoring, Assessment, and Control  

Science Conference Proceedings (OSTI)

Power system operation technologies such as computerized one-line diagram visualization, state estimation, contingency analysis, and distance relay were developed upwards of 50 years ago, However, technological advances in communication, computing, and algorithms have made it possible to reexamine methods for performing real-time monitoring, assessment, and control. This report describes the vision, infrastructure, and technology roadmap for future smart control centers.

2009-01-22T23:59:59.000Z

276

DOE's Industrial Assessment Centers (IAC) Program: Results and Benefits  

E-Print Network (OSTI)

Energy efficiency is foundational to the creation of a clean energy economy. Recent studies have speculated on the size of job creation opportunities in the clean energy field, but many of those studies have not adequately involved companies in the energy efficiency industry. The DOEs IAC program is an important federal effort which provides a steady stream of top young engineers into energy efficiency careers, helps small/medium sized manufacturers save energy and copes with the enormous recent increases in fuel costs; and develops energy efficiency expertise in faculty at our top engineering schools. Workforce issues in energy are big and getting bigger. IAC program helps with the ITP goals of establishing relevant Intellectual Capital and developing certified practitioners.

Nimbalker, S.; Martin, M.

2009-05-01T23:59:59.000Z

277

Short communication: Application of symmetric fuzzy linear programming in life cycle assessment  

Science Conference Proceedings (OSTI)

Life cycle assessment (LCA) is known to entail multiple objective decision-making in the analysis of tradeoffs between different environmental impacts. The work of Azapagic and Clift in the late 1990s illustrates the use of multiple objective linear ... Keywords: Fuzzy linear programming, Life cycle assessment

Raymond R. Tan

2005-10-01T23:59:59.000Z

278

Livermore Field Office Technical Qualification Program Self Assessment Report, May 31, 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration (NNSA) Nuclear Security Administration (NNSA) Livermore Field Office Technical Qualification Program Self Assessment Report May 31, 2013 Assessment Team Richard crowe:NNSA NA-SH-80, Team Leader Dan Schwendenman, NNSA NA-SH-50 Carol lngn;:NNSA LFO Facility Operations Approved By: Phll ' F~nt .r/:;,/;.J ~I Date Date Date~/ NNSA Livermore Field Office TQP Self Assessment (NNSA LSO TQP SA) Report Table of Contents Executive Summary ............................................................................................................. 1 Introduction .......................................................................................................................... 3 Scope and Methodology ...................................................................................................... 3

279

Low Dose Radiation Research Program: Assessing Biological Function of DNA  

NLE Websites -- All DOE Office Websites (Extended Search)

Assessing Biological Function of DNA Damage Response Genes Assessing Biological Function of DNA Damage Response Genes Larry H. Thompson Lawrence Livermore National Laboratory Why This Project To understand the relative importance of individual DNA repair and DNA-damage response pathways to the recovery of mammalian cells after exposure to low doses of ionizing radiation (IR). This understanding may lead to better ways of setting limits on human exposure to IR. In spite of the discovery of many mammalian DNA repair genes, our current knowledge of how many of these genes contribute to cellular recovery from IR exposure is quite limited. Project Goals Measure cellular responses at doses in the 5-100 cGy range, which generally cause changes too small to detect in normal, repair-proficient cells Focus on DNA double-strand breaks (DSBs) and DNA oxidative base

280

Program on Technology Innovation: Multi-Metering Technology Assessment  

Science Conference Proceedings (OSTI)

The essential concept of multi metering is to physically centralize the metering of electric service to multiple consumers so that a single communications module can serve all customers services with a single shared enclosure, power supply, memory, and computing capability. This report describes versions of multi metering currently on the market around the world. It assesses available and emerging multi-metering technologies, their possible applications in North America, and the comparative economics of ...

2008-11-17T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

DOE/EA-1535; Uranium Leasing Program Final Programmatic Environmental Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leasing Program Leasing Program Final Programmatic Environmental Assessment July 2007 Office of Legacy Management DOE/EA 1535 - Work Performed Under DOE Contract No. for the U.S. Department of Energy Office of Legacy Management. DE-AC01-02GJ79491 Approved for public release; distribution is unlimited. Office of Legacy Management Office of Legacy Management Office of Legacy Management U.S. Department of Energy DOE/EA-1535 Uranium Leasing Program Final Programmatic Environmental Assessment July 2007 U.S. Department of Energy Office of Legacy Management U.S. Department of Energy Uranium Leasing Program Environmental Assessment July 2007 Doc. No. Y0011700 Page iii Contents Abbreviations and Acronyms ........................................................................................................

282

U.S. Global Change Research Program publishes "National Climate Assessment"  

Open Energy Info (EERE)

U.S. Global Change Research Program publishes "National Climate Assessment" U.S. Global Change Research Program publishes "National Climate Assessment" report for United States Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(2002) Super contributor 18 January, 2013 - 15:46 climate change drought OpenEI sea level rise temperatures U.S. Global Climate Change program The U.S. Global Change Research Program, established under the Department of Commerce in 2010, and partnered with NOAA, released an extensive National Climate Assessment report, projecting future climate changes in the United States under different scenarios. The 1,200 page report highlights some rather grim findings about the future of climate change. Here are 5 of the more disconcerting graphics from the report: 1. U.S. Average Temperatures

283

U.S. Department of Energy State Coupled Resource Assessment Program Final Report for FY 1982  

DOE Green Energy (OSTI)

During FY 1982, ESL/UURI tasks under the DOE State Coupled Program included: 2.1 Technical Assistance--Provide assistance to DOE through communicating program objectives, acting as liason among state contractors and other program participants, and writing periodic status reports. promote coordination of this program with other federal geothermal programs. 2.2 Technical Services--Provide geological, geochemical, and geophysical expertise and support as requested by state teams and other program participants to the extent made possible by funding. 2.3 Publications--Document and publish technical aspects of this program that are otherwise not documented in state contractor or other reports, provide DOE with semi-annual technical and status reports. This status report summarizes activities under 2.1 and 2.3. Technical services provided by ESL/UURI to individual state resource assessment teams are summarized in a separate technical support memorandum.

Foley, Duncan

1983-02-01T23:59:59.000Z

284

Hawaii Energy Strategy: Program guide  

SciTech Connect

The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii`s energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii`s energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

1992-09-01T23:59:59.000Z

285

Summary results of an assessment of research projects in the National Photovoltaics Program  

DOE Green Energy (OSTI)

The Office of Energy Research (OER) undertook an assessment of 115 research projects (listed in Appendix A) sponsored by the National Photovoltaics Program. The Program is located within the Office of Energy Efficiency and Renewable Energy (EE). This report summarizes the results of that review. The Office of Solar Energy Conversion is responsible for the management of the National Photovoltaics Program. This program focuses on assisting US industry in development of fundamental technology to bring advanced photovoltaic energy systems to commercial use. The purpose of the assessment was to determine the following: (1) the quality of research of individual projects; (2) the impact of these individual projects on the mission of the program; and (3) the priority of future research opportunities.

NONE

1995-07-01T23:59:59.000Z

286

Radiological/Health physics program assessement at Rocky Flats, the process  

SciTech Connect

The Department of Energy, Rocky Flats Office, Safety and Health Group, Health Physics Team (HPT) is responsible for oversight of the Radiation Protection and Health Physics Program (RPHP) of the Integrating Management Contractor (IMC), Kaiser-Hill (K-H) operations at the Rocky Flats Environmental Technology Site (RFETS). As of 1 January 1996 the Rocky Flats Plant employed 300 DOE and 4,300 contractor personnel (K-H and their subcontractors). WSI is a subcontractor and provides plant security. To accomplish the RPHP program oversight HPT personnel developed a systematic methodology for performing a functional RPHP Assessment. The initial process included development of a flow diagram identifying all programmatic elements and assessment criteria documents. Formulation of plans for conducting interviews and performance of assessments constituted the second major effort. The generation of assessment reports was the final step, based on the results of this process. This assessment will be a 6 person-year effort, over the next three years. This process is the most comprehensive assessment of any Radiation Protection and Health Physics (RPHP) Program ever performed at Rocky Flats. The results of these efforts will establish a baseline for future RPHP Program assessments at RFETS. This methodology has been well-received by contractor personnel and creates no Privacy Act violations or other misunderstandings.

Psomas, P.O. [Department of Energy, Golden, CO (United States)

1996-06-01T23:59:59.000Z

287

1992--1993 low-temperature geothermal assessment program, Colorada  

DOE Green Energy (OSTI)

Previous assessments of Colorado`s low-temperature geothermal resources were completed by the Colorado Geological Survey in 1920 and in the mid- to late-1970s. The purpose of the 1992--1993 low-temperature geothermal resource assessment is to update the earlier physical, geochemical, and utilization data and compile computerized databases of the location, chemistry, and general information of the low-temperature geothermal resources in Colorado. The main sources of the data included published data from the Colorado Geological Survey, the US Geological Survey WATSTOR database, and the files of the State Division of Water Resources. The staff of the Colorado Geological Survey in 1992 and 1993 visited most of the known geothermal sources that were recorded as having temperatures greater than 30{degrees}C. Physical measurements of the conductivity, pH, temperature, flow rate, and notes on the current geothermal source utilization were taken. Ten new geochemical analyses were completed on selected geothermal sites. The results of the compilation and field investigations are compiled into the four enclosed Quattro Pro 4 databases. For the purposes of this report a geothermal area is defined as a broad area, usually less than 3 sq mi in size, that may have several wells or springs. A geothermal site is an individual well or spring within a geothermal area. The 1992-1993 assessment reports that there are 93 geothermal areas in the Colorado, up from the 56 reported in 1978; there are 157 geothermal sites up from the 125 reported in 1978; and a total of 382 geochemical analyses are compiled, up from the 236 reported in 1978. Six geothermal areas are recommended for further investigation: Trimble Hot Springs, Orvis Hot Springs, an area southeast of Pagosa Springs, the eastern San Luis Valley, Rico and Dunton area, and Cottonwood Hot Springs.

Cappa, J.A.; Hemborg, H.T.

1995-01-01T23:59:59.000Z

288

NISTIR 7669, Open Vulnerability Assessment Language ...  

Science Conference Proceedings (OSTI)

... These validations are based on the test requirements defined in this document, which cover four distinct but related ... Window Vista Windows 7 ...

2013-04-25T23:59:59.000Z

289

Security Maxims - Vulnerability Assessment Team - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

Tobias Maxim 5: Encryption is largely irrelevant. From Marc Weber Tobias. Red Herring Maxim: At some point in any challenging security application, somebody (or nearly...

290

Current Projects: Rapid Sampling Tools - Vulnerability Assessment...  

NLE Websites -- All DOE Office Websites (Extended Search)

Applications include counter-terrorism, emergency response teams, drug and environmental raids, and waste management. For more information visit Rapid Sampling from Sealed...

291

More information - Vulnerability Assessment Team - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

We've devised fundamentally new approaches to tamper detection, intrusion detection, nuclear safeguards and cargo security. Team members have won numerous awards, including: 2013...

292

Assessing the vulnerability of replicated network services  

Science Conference Proceedings (OSTI)

Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a service by connecting to one of a redundant set of servers. These networks ...

George Dean Bissias; Brian Neil Levine; Ramesh K. Sitaraman

2010-11-01T23:59:59.000Z

293

Low-temperature resource assessment program. Final report  

DOE Green Energy (OSTI)

The US Department of Energy - Geothermal Division (DOE/GD) recently sponsored the Low-Temperature Resource Assessment project to update the inventory of the nation`s low- and moderate-temperature geothermal resources and to encourage development of these resources. A database of 8,977 thermal wells and springs that are in the temperature range of 20{degrees}C to 150{degrees}C has been compiled for ten western states, an impressive increase of 82% compared to the previous assessments. The database includes location, descriptive data, physical parameters, water chemistry and references for sources of data. Computer-generated maps are also available for each state. State Teams have identified 48 high-priority areas for near-term comprehensive resource studies and development. Resources with temperatures greater than 50{degrees}C located within 8 km of a population center were identified for 271 collocated cities. Geothermal energy cost evaluation software has been developed to quickly identify the cost of geothermally supplied heat to these areas in a fashion similar to that used for conventionally fueled heat sources.

Lienau, P.J. [Oregon Inst. of Tech., Klamath Falls, OR (United States). Geo-Heat Center] [Oregon Inst. of Tech., Klamath Falls, OR (United States). Geo-Heat Center; Ross, H. [Utah Univ., Salt Lake City, UT (United States). Earth Sciences and Resources Inst.] [Utah Univ., Salt Lake City, UT (United States). Earth Sciences and Resources Inst.

1996-02-01T23:59:59.000Z

294

The 1980-1982 Geothermal Resource Assessment Program in Washington  

DOE Green Energy (OSTI)

Since 1978, the Division of Geology and Earth Resources of the Washington Department of Natural Resources has participated in the U.S. Department of Energy's (USDOE) State-Coupled Geothermal Resource Program. Federal and state funds have been used to investigate and evaluate the potential for geothermal resources, on both a reconnaissance and area-specific level. Preliminary results and progress reports for the period up through mid-1980 have already been released as a Division Open File Report (Korosec, Schuster, and others, 1981). Preliminary results and progress summaries of work carried out from mid-1980 through the end of 1982 are presented in this report. Only one other summary report dealing with geothermal resource investigations in the state has been published. An Information Circular released by the Division (Schuster and others, 1978) compiled the geology, geochemistry, and heat flow drilling results from a project in the Indian Heaven area in the south Cascades. The previous progress report for the geothermal program (Korosec, Schuster, and others, 1981) included information on temperature gradients measured throughout the state, heat flow drilling in the southern Cascades, gravity surveys for the southern Cascades, thermal and mineral spring investigations, geologic mapping for the White Pass-Tumac Mountain area, and area specific studies for the Camas area of Clark County and Mount St. Helens. This work, along with some additional studies, led to the compilation of the Geothermal Resources of Washington map (Korosec, Kaler, and others, 1981). The map is principally a nontechnical presentation based on all available geothermal information, presented as data points, tables, and text on a map with a scale of 1:500,000.

Korosec, Michael A.; Phillips, William M.; Schuster, J.Eric

1983-08-01T23:59:59.000Z

295

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

296

Gas reactor international cooperative program. HTR-synfuel application assessment  

SciTech Connect

This study assesses the technical, environmental and economic factors affecting the application of the High Temperature Gas-Cooled Thermal Reactor (HTR) to: synthetic fuel production; and displacement of fossil fuels in other industrial and chemical processes. Synthetic fuel application considered include coal gasification, direct coal liquefaction, oil shale processing, and the upgrading of syncrude to motor fuel. A wide range of other industrial heat applications was also considered, with emphasis on the use of the closed-loop thermochemical energy pipeline to supply heat to dispersed industrial users. In this application syngas (H/sub 2/ +CO/sub 2/) is produced at the central station HTR by steam reforming and the gas is piped to individual methanators where typically 1000/sup 0/F steam is generated at the industrial user sites. The products of methanation (CH/sub 4/ + H/sub 2/O) are piped back to the reformer at the central station HTR.

1979-09-01T23:59:59.000Z

297

Nuclear proliferation and civilian nuclear power. Report of the Nonproliferation Alternative Systems Assessment Program. Volume VII. International perspectives  

SciTech Connect

The purpose of this volume is to assess the proliferation vulnerabilities of the present deployment of civilian nuclear-power systems within the current nonproliferation regime and, in light of their prospective deployment, to consider technical and institutional measures and alternatives which may contribute to an improved regime in which nuclear power could play a significant part. An assessment of these measures must include consideration of their nonproliferation effectiveness as well as their bearing upon energy security, and their operational, economic, and political implications. The nature of these considerations can provide some measure of their likely acceptability to various nations.

Not Available

1980-06-01T23:59:59.000Z

298

Radwaste assessment program for nuclear station modifications by design engineering  

SciTech Connect

Radwaste burial for Duke Power Company's (DPC's) seven nuclear units has become a complicated and costly process. Burial costs are based on overall volume, surcharges for radioactivity content and weight of containers, truck and cask rental, driver fees, and state fees and taxes. Frequently, radwaste costs can be as high as $500 per drum. Additionally, DPC is limited on the total burial space allocated for each plant each year. The thrust of this program is to reduce radwaste volumes needing burial at either Barnwell, South Carolina, or Richland, Washington. A limited number of options are available at our sites: (a) minimization of radwaste volume production, (b) segregation of contamination and noncontaminated trash, (c) decontamination of small hardware, (d) volume reduction of compatible trash, (e) incineration of combustible trash (available at Oconee in near future), and (f) burial of below-regulatory-concern very low level waste on site. Frequently, costs can be reduced by contracting services outside the company, i.e., supercompaction, decontamination, etc. Information about radwaste volumes, activities, and weight, however, must be provided to the nuclear production department (NPD) radwaste group early in the nuclear station modification (NSM) process to determine the most cost-effective method of processing radwaste. In addition, NSM radwaste costs are needed for the NPD NSM project budget. Due to the advanced planning scope of this budget, NSM construction costs must be estimated during the design-phase proposal.

Eble, R.G.

1988-01-01T23:59:59.000Z

299

Los Alamos Site Office Nuclear Maintenance Management Program Oversight Self-Assessment, April 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11-18 11-18 Site: Los Alamos National Laboratory Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Los Alamos Site Office Nuclear Maintenance Management Program Oversight Self-Assessment Dates of Activity : 11/14/2011 - 11/18/2011 Report Preparer: Tim Martin Activity Description/Purpose: This activity report documents the results of the U.S. Department of Energy (DOE) Office of Health, Safety and Security (HSS) review of the Los Alamos Site Office (LASO) self-assessment of LASO's Nuclear Maintenance Management Program (NMMP) oversight program and activities. This self-assessment was led by the DOE LASO Facility Operations/Safety Engineering Team's (FO/SET) Nuclear Facility Maintenance Manager and was

300

In Situ Remediation Integrated Program, Evaluation and assessment of containment technology  

SciTech Connect

The In Situ Remediation Integrated Program (ISRIP) was established by the US Department of Energy (DOE) to advance the state-of-the art of innovative in situ remediation technologies to the point of demonstration and to broaden the applicability of these technologies to the widely varying site remediation requirements throughout the DOE complex. This program complements similar ongoing integrated demonstration programs being conducted at several DOE sites. The ISRIP has been conducting baseline assessments on in situ technologies to support program planning. Pacific Northwest Laboratory conducted an assessment and evaluation of subsurface containment barrier technology in support of ISRIP`s Containment Technology Subprogram. This report summarizes the results of that activity and provides a recommendation for priortizing areas in which additional research and development is needed to advance the technology to the point of demonstration in support of DOE`s site restoration activities.

Gerber, M.A.; Fayer, M.J.

1994-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

IMPACTS: Industrial Technologies Program, Summary of Program Results for CY2009, Appendix 7: Methodology for Technology Tracking and Assessment of Benefits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

191 DOE Industrial Technologies Program 191 DOE Industrial Technologies Program Appendix 7: Methodology for Technology Tracking and Assessment of Benefits u Technology Tracking............................................................................................................................................ 192 u Methods of Estimating Benefits.............................................................................................................................. 192 u Deriving the ITP Cost/Benefit Curve ...................................................................................................................... 193 Methodology for Technology Tracking and Assessment of Benefits

302

Assessment of Comanche Peak, Ringhals, and Diablo Canyon Elevated pH Programs  

Science Conference Proceedings (OSTI)

The formation and transport of activated corrosion products within the primary reactor coolant system (RCS) can adversely affect fuel performance, plant operation, and out-of-core radiation fields. Controlling the high temperature pH (pHT) of the Pressurized Water Reactor (PWR) primary circuit can successfully mitigate this process. This report assesses the effects of implementing elevated pH programs to determine the impact of the pH program changes on various plant indicators relating ...

2012-12-20T23:59:59.000Z

303

Coastal Impacts, Adaptation, and Vulnerabilities  

E-Print Network (OSTI)

· Robert R. Twilley, Louisiana State University · Jordan West, U.S. Environmental Protection Agency Chapter and Restoration Authority of Louisiana · Richard Raynie, Coastal Protection and Restoration Authority of Louisiana.3.7 Emergency Response, Recovery, and Vulnerability Reduction 4.3.8 Coastal and Nearshore Oil and Ga0 4.4 Human

Kossin, James P.

304

Understanding cyber threats and vulnerabilities  

Science Conference Proceedings (OSTI)

This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was ... Keywords: actor, critical infrastructure, cyber crime, cyber terrorism, cyber threat, cyber vulnerabilities

Eric Luiijf

2012-01-01T23:59:59.000Z

305

Mixed Waste Integrated Program: A technology assessment for mercury-containing mixed wastes  

SciTech Connect

The treatment of mixed wastes must meet US Environmental Protection Agency (EPA) standards for chemically hazardous species and also must provide adequate control of the radioactive species. The US Department of Energy (DOE) Office of Technology Development established the Mixed Waste Integrated Program (MWIP) to develop mixed-waste treatment technology in support of the Mixed Low-Level Waste Program. Many DOE mixed-waste streams contain mercury. This report is an assessment of current state-of-the-art technologies for mercury separations from solids, liquids, and gases. A total of 19 technologies were assessed. This project is funded through the Chemical-Physical Technology Support Group of the MWIP.

Perona, J.J.; Brown, C.H.

1993-03-01T23:59:59.000Z

306

[Environmental Hazards Assessment Program annual report, June 1992--June 1993]. Summer undergraduate research program: Environmental studies  

Science Conference Proceedings (OSTI)

The purpose of the summer undergraduate internship program for research in environmental studies is to provide an opportunity for well-qualified students to undertake an original research project as an apprentice to an active research scientist in basic environmental research. Ten students from throughout the midwestern and eastern areas of the country were accepted into the program. These students selected projects in the areas of marine sciences, biostatistics and epidemiology, and toxicology. The research experience for all these students and their mentors was very positive. The seminars were well attended and the students showed their interest in the presentations and environmental sciences as a whole by presenting the speakers with thoughtful and intuitive questions. This report contains the research project written presentations prepared by the student interns.

McMillan, J. [ed.

1993-12-01T23:59:59.000Z

307

Panel results of the solar thermal program research requirement assessment review. Final report  

DOE Green Energy (OSTI)

The objectives of the assessment were to identify: research needs by topic and activity, relative priority of research needs, options for performing needed research, potential performers, costs and duration of R and D activities, gaps and duplications within the R and D program, and activities underway that appear to be of low priority. To achieve these objectives, research programs of the Division of Solar Thermal Technologies within the Office of Renewable Energy and Conservation and the Materials and Advanced Energy Programs of the Office of Basic Energy Sciences were reviewed. Several recent assessments of solar thermal research needs made within the past two years by various groups were also reviewed, and the key research issues and needs were extracted. The primary results from the assessment are a set of prioritized activities to meet the most important research needs for solar thermal technologies. These activities belong to four disciplines: materials science, thermal science, thermochemistry, and engineering. Further, priorities associated with the needs for research result from the various activities allow the recommended activities to be grouped into two categories; a core group which should be at the heart of any future program developed by the department, and a set of important needs that should, at least, find their way into a program at some time during its existence. The recommended research program is outlined, and the complete set of ranked research needs is listed.

None

1983-11-01T23:59:59.000Z

308

Security Evaluation for Software System with Vulnerability Life Cycle and User Profiles  

Science Conference Proceedings (OSTI)

This paper proposes the definition of a security criterion and security assessment based on the criterion. More precisely, we present a stochastic model with a vulnerability life-cycle model and a user profile using continuous-time Markov chains. The ... Keywords: vulnerability, security evaluation, user profile

Hiroyuki Okamura; Masataka Tokuzane; Tadashi Dohi

2012-11-01T23:59:59.000Z

309

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: McAfee Web Gateway Web Access Cross Site Scripting 0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis PROBLEM: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability. PLATFORM: The vulnerability is reported in versions prior to 7.1.5.2. ABSTRACT: Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI. reference LINKS: McAfee Web Gateway Release Notes Bugtraq ID: 50341 Secunia Advisory: SA46570 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in McAfee Web Gateway, which can be

310

V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PuTTY SSH Handshake Integer Overflow Vulnerabilities 3: PuTTY SSH Handshake Integer Overflow Vulnerabilities V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities August 7, 2013 - 6:00am Addthis PROBLEM: SEARCH-LAB has reported some vulnerabilities in PuTTY PLATFORM: PuTTY 0.x ABSTRACT: The vulnerabilities can be exploited by malicious people to potentially compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54354 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3520 CVE-2013-4206 CVE-2013-4207 CVE-2013-4208 CVE-2013-4852 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerabilities are caused due to some integer overflow errors when handling the SSH handshake and can be exploited to cause heap-based buffer overflows via a negative handshake message length. IMPACT: Successful exploitation of may allow execution of arbitrary code

311

U-098: ISC BIND Deleted Domain Name Resolving Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

098: ISC BIND Deleted Domain Name Resolving Vulnerability 098: ISC BIND Deleted Domain Name Resolving Vulnerability U-098: ISC BIND Deleted Domain Name Resolving Vulnerability February 8, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in ISC BIND, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: ISC BIND 9.2.x ISC BIND 9.3.x ISC BIND 9.4.x ISC BIND 9.5.x ISC BIND 9.6.x ISC BIND 9.7.x ISC BIND 9.8.x ABSTRACT: The vulnerability is caused due to an error within the cache update policy. reference LINKS: Original Advisory Secunia Advisory SA47884 CVE-2012-1033 IMPACT ASSESSMENT: High Discussion: Researchers discovered a vulnerability affecting the large majority of popular DNS implementations which allows a malicious domain name to stay resolvable long after it has been removed from the upper level servers. The

312

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

313

U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM WebSphere Commerce User Information Disclosure 2: IBM WebSphere Commerce User Information Disclosure Vulnerability U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability October 2, 2012 - 6:00am Addthis PROBLEM: IBM WebSphere Commerce User Information Disclosure Vulnerability PLATFORM: WebSphere Commerce Versions 6.0.0.0 to 6.0.0.11 WebSphere Commerce Versions 7.0.0.0 to 7.0.0.6 ABSTRACT: A vulnerability in WebSphere Commerce could allow disclosure of user personal data. reference LINKS: IBM Security Bulletin 1612484 X-Force Vulnerability Database (78867) Secunia Advisory SA50821 CVE-2012-4830 IMPACT ASSESSMENT: Medium Discussion: A remote unauthenticated attacker could exploit a security vulnerability in WebSphere Commerce to expose user personal data. The attack can be performed manually and the effort required is comparatively low.

314

U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Windows win32k.sys Memory Corruption Vulnerability 5: Microsoft Windows win32k.sys Memory Corruption Vulnerability U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability December 20, 2011 - 9:45am Addthis PROBLEM: Microsoft Windows win32k.sys Memory Corruption Vulnerability. PLATFORM: Operating System Microsoft Windows 7 ABSTRACT: Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. reference LINKS: Secunia Advisory SA47237 MS11-087:Article ID: 2639417 IMPACT ASSESSMENT: High Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page

315

V-082: Novell GroupWise Client Two Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Novell GroupWise Client Two Vulnerabilities 2: Novell GroupWise Client Two Vulnerabilities V-082: Novell GroupWise Client Two Vulnerabilities February 1, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in Novell GroupWise Client PLATFORM: Novell GroupWise 2012 Novell GroupWise Client 2012 Novell GroupWise Client 8.x Novell GroupWise Server 8.x ABSTRACT: Two vulnerabilities have been reported in Novell GroupWise Client which can be exploited by malicious people to compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52031 CVE-2012-0439 CVE-2013-0804 Novell KB 7011687 Novell KB 7011688 IMPACT ASSESSMENT: High DISCUSSION: The GroupWise Client for Windows is vulnerable to an ActiveX Control exploit where by enticing a target user to open a malicious file or visit a malicious page, a remote attacker could execute arbitrary code on

316

U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: VMware vCenter Operations Cross-Site Scripting Vulnerability 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory Secunia Advisory SA50795 CVE-2012-5050 IMPACT ASSESSMENT: Medium Discussion: Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Impact: A vulnerability in VMware vCenter Operations, which can be exploited to

317

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

318

V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IntegraXor ActiveX Control Buffer Overflow Vulnerability 6: IntegraXor ActiveX Control Buffer Overflow Vulnerability V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability February 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in IntegraXor PLATFORM: Integraxor Versions prior to 4.x ABSTRACT: The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. REFERENCE LINKS: Secunia Advisory SA52073 CVE-2012-4700 US-CERT Advisory IMPACT ASSESSMENT: High DISCUSSION: Successfully exploiting this vulnerability could lead to a DoS for the application or could allow an attacker to execute arbitrary code. IMPACT: Successful exploitation may allow execution of arbitrary code. SOLUTION: Update to version 4.00 build 4280.0 Addthis Related Articles

319

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

320

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability January 23, 2012 - 9:00am Addthis PROBLEM: Linux Kernel "/proc//mem" Privilege Escalation Vulnerability. PLATFORM: Linux Kernel 2.6.x ABSTRACT: A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges reference LINKS: Linux Kernel Update CVE-2012-0056 Red Hat Bugzilla Bug 782642 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to the kernel not properly restricting access to "/proc//mem" file, which can be exploited to gain escalated privileges by e.g. writing into the memory of a privileged process.

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing 5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java. IMPACT: Apache can be exploited by malicious people to conduct spoofing attacks. SOLUTION: The vendor has issued a fix. Addthis Related Articles

322

U-224: ISC DHCP Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: ISC DHCP Multiple Denial of Service Vulnerabilities 4: ISC DHCP Multiple Denial of Service Vulnerabilities U-224: ISC DHCP Multiple Denial of Service Vulnerabilities July 31, 2012 - 7:00am Addthis PROBLEM: ISC DHCP Multiple Denial of Service Vulnerabilities PLATFORM: ISC DHCP before versions DHCP 4.1-ESV-R6 or DHCP 4.2.4-P1 ABSTRACT: ISC DHCP is prone to multiple denial-of-service vulnerabilities. reference LINKS: BIND and DHCP Security Updates Released Bugtraq ID: 54665 Secunia Advisory SA50018 CVE-2012-3571 CVE-2012-3570 CVE-2012-3954 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error when handling client identifiers can be exploited to trigger an endless loop and prevent the server from processing further client requests

323

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

324

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

211: IBM iNotes Multiple Vulnerabilities 211: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related to MIME mail is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) An integer overflow error within the DWA9W ActiveX control can be exploited to execute arbitrary code.

325

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability 5: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability June 27, 2011 - 4:31pm Addthis PROBLEM: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability PLATFORM: Mozilla Firefox ABSTRACT: Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. reference LINKS: Securityfocus Mozilla Firefox Homepage MFSA 2011-27: XSS encoding hazard with inline SVG IMPACT ASSESSMENT: High Discussion: Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to

326

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities August 6, 2012 - 7:00am Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions 2.0.1.358 and earlier. ABSTRACT: Vulnerabilities in Adobe Flash Player version included with the BlackBerry PlayBook tablet software reference LINKS: BlackBerry Article ID: KB31675 Secunia Advisory SA50164 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 CVE-2012-0768 CVE-2012-0769 CVE-2012-0773 CVE-2012-0779 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

327

International Nonproliferation Export Control Program (INECP)  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and Nonproliferation and National Security Program > TNPS > Strategic Trade Control > International Programs > INECP Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr

328

Super-Efficient Refrigerator Program (SERP) evaluation volume 2: Preliminary impact and market transformation assessment  

SciTech Connect

The Super Efficient Refrigerator Program (SERP) is a collaborative utility program intended to transform the market for energy-efficient and environmentally friendly refrigerators. It is one of the first examples of a large-scale {open_quotes}market transformation{close_quotes} energy efficiency program. This report documents the preliminary impact and market transformation evaluation of SERP ({open_quotes}the Program{close_quotes}). Pacific Northwest National Laboratory (PNNL) conducted this evaluation for the U.S. Department of Energy. This study focuses on the preliminary impact evaluation and market transformation assessment, but also presents limited process evaluation information. It is based on interviews with refrigerator dealers and manufacturers, interviews with utility participants, industry data, and information from the Program administrators. Results from this study complement those from prior process evaluation also conducted by PNNL. 42 refs., 5 figs., 4 tabs.

Lee, A.D.; Conger, R.L.

1996-08-01T23:59:59.000Z

329

Vulnerability Analysis of Energy Delivery Control Systems - 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability Analysis of Energy Delivery Control Systems - 2011 Vulnerability Analysis of Energy Delivery Control Systems - 2011 Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy delivery systems has emerged as one of the Nation's most serious grid modernization and infrastructure protection issues. Cyber adversaries are becoming increasingly targeted, sophisticated, and better financed. The energy sector must research, develop and deploy new cybersecurity capabilities faster than the adversary can launch new attack tools and techniques. The goal of the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE) National Supervisory Control and Data Acquisition (SCADA) Test Bed (NSTB) program is to enhance the reliability and resiliency of the Nation's energy infrastructure by reducing the risk

330

Chemical Safety Vulnerability Working Group report. Volume 1  

Science Conference Proceedings (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

Not Available

1994-09-01T23:59:59.000Z

331

Voluntary Agreements for Energy Efficiency or GHG Emissions Reduction in Industry: An Assessment of Programs Around the World  

E-Print Network (OSTI)

Energy or CO2 tax Energy Audits and Assessments Emissionssuch as free or low-cost energy audits or tax exemptions forinvestments in wind energy, audit programs, benchmarking,

Price, Lynn

2005-01-01T23:59:59.000Z

332

V-207: Wireshark Multiple Denial of Service Vulnerabilities ...  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

333

V-019: Google Chrome Multiple Vulnerabilities | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Google Chrome Multiple Vulnerabilities V-019: Google Chrome Multiple Vulnerabilities November 8, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

334

Independent Assessment of Technology Characterizations to Support the Biomass Program Annual State-of-Technology Assessments  

DOE Green Energy (OSTI)

This report discusses an investigation that addressed two thermochemical conversion pathways for the production of liquid fuels and addressed the steps to the process, the technology providers, a method for determining the state of technology and a tool to continuously assess the state of technology. This report summarizes the findings of the investigation as well as recommendations for improvements for future studies.

Yeh, B.

2011-03-01T23:59:59.000Z

335

Chief of Nuclear Safety (CNS) Senior Technical Safety Manager (STSM) Qualification Program Self-Assessment Report - August 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chief of Nuclear Safety (CNS) Chief of Nuclear Safety (CNS) Self-Assessment Report Senior Technical Safety Manager Qualification Program CONTENTS Background ................................................................................................................................ 1 Results ....................................................................................................................................... 1 Assessment Criteria ................................................................................................................... 1 Finding ....................................................................................................................................... 2 Observation ............................................................................................................................... 2

336

Liquefied Gaseous Fuels Safety and Environmental Control Assessment Program: second status report  

SciTech Connect

This document is arranged in three volumes and reports on progress in the Liquefied Gaseous Fuels (LGF) Safety and Environmental Control Assessment Program made in fiscal Year (FY)-1979 and early FY-1980. Volume 3 contains reports from 6 government contractors on LPG, anhydrous ammonia, and hydrogen energy systems. Report subjects include: simultaneous boiling and spreading of liquefied petroleum gas (LPG) on water; LPG safety research; state-of-the-art of release prevention and control technology in the LPG industry; ammonia: an introductory assessment of safety and environmental control information; ammonia as a fuel, and hydrogen safety and environmental control assessment.

1980-10-01T23:59:59.000Z

337

Minutes of the 7th Meeting of the Livermore Vulnerability Committee  

SciTech Connect

This memorandum provides the minutes of the 7th meeting of the Livermore Vulnerability Committee. The Laboratory commitments in the Tapestry experiment, with particular reference to those experiments proposed in the Polaris MK 2 and the Minuteman MK 2 programs.

Germain, L.

1965-05-26T23:59:59.000Z

338

NEHRP - Hazard Vulnerability and Disaster Resiliency ...  

Science Conference Proceedings (OSTI)

... Hazard Vulnerability and Disaster Resiliency. 2013. ... gaps for achieving resilience in the ... protection, emergency response, business continuity, and ...

339

Strategic Environmental Research and Development Program: Atmospheric Remote Sensing and Assessment Program -- Final Report. Part 1: The lower atmosphere  

Science Conference Proceedings (OSTI)

This report documents work done between FY91 and FY95 for the lower atmospheric portion of the joint Department of Defense (DoD) and Department of Energy (DOE) Atmospheric Remote Sensing and Assessment Program (ARSAP) within the Strategic Environmental Research and Development Program (SERDP). The work focused on (1) developing new measurement capabilities and (2) measuring atmospheric heating in a well-defined layer and then relating it to cloud properties an water vapor content. Seven new instruments were develop3ed for use with Unmanned Aerospace Vehicles (UAVs) as the host platform for flux, radiance, cloud, and water vapor measurements. Four major field campaigns were undertaken to use these new as well as existing instruments to make critically needed atmospheric measurements. Scientific results include the profiling of clear sky fluxes from near surface to 14 km and the strong indication of cloudy atmosphere absorption of solar radiation considerably greater than predicted by extant models.

Tooman, T.P. [ed.] [Sandia National Labs., Livermore, CA (United States). Exploratory Systems Technology Dept.

1997-01-01T23:59:59.000Z

340

Review of the Los Alamos Site Office Safety System Oversight Program Self-Assessment, March 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Office Site Office Safety System Oversight Program Self-Assessment March 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose ................................................................................................................................................... 1 2.0 Background ............................................................................................................................................ 1 3.0 Scope ...................................................................................................................................................... 1

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

EPRI Nondestructive Evaluation Center, Assessment of the Intergranular Stress Corrosion Cracking Training and Qualification Program  

Science Conference Proceedings (OSTI)

Independent, periodic evaluations of training programs at the EPRI Nondestructive Evaluation Center ensure fulfillment of utility needs and regulatory requirements for qualified personnel. A recent assessment recommended lengthening trainee time spent in hands-on practice with flawed BWR pipe samples.

1988-03-04T23:59:59.000Z

342

Review of the Los Alamos Site Office Safety System Oversight Program Self-Assessment, March 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Office Site Office Safety System Oversight Program Self-Assessment March 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose ................................................................................................................................................... 1 2.0 Background ............................................................................................................................................ 1 3.0 Scope ...................................................................................................................................................... 1

343

Environmental assessment for the satellite power system concept development and evaluation program: atmospheric effects  

DOE Green Energy (OSTI)

The US Department of Energy (DOE) has undertaken a preliminary, three-year program to investigate the impacts of the construction and operation of a satellite power system, of unprecedented scale. The Department of Energy's program, titled The Concept Development and Evaluation Program, focused its investigations on a Reference System description that calls for the use of either silicon (Si) or gallium aluminum-arsenide (GaAlAs) photovoltaic cells on 60 satellites to be constructed in GEO over a 30-yr period. Rectennas would be constructed on the ground to receive microwave energy from the satellites. Each satellite-rectenna pair is designed to produce 5 GW of power on an essentially continuous basis for use as a baseload power source for an electric power distribution system. The environmental assessment part of the program was divided into five interdependent task areas. The present document constitutes the final technical report on one of the five task areas, the Assessment of the Atmospheric Effects, and as such presents an in-depth summary of work performed during the assessment program. The issues associated with SPS activities in the troposphere are examined. These include tropospheric weather modification related to rectenna operations and rocket launches, and air quality impacts related to rocketlaunch ground clouds. Then progressing upward through the various levels of the atmosphere, the principal middle and upper atmospheric effects associated with rocket effluents are analyzed. Finally, all of the potential SPS atmospheric effects are summarized.

Rote, D.M.; Brubaker, K.L.; Lee, J.L.

1980-11-01T23:59:59.000Z

344

Locating Climate Insecurity: Where Are the Most Vulnerable Places in  

Open Energy Info (EERE)

Locating Climate Insecurity: Where Are the Most Vulnerable Places in Locating Climate Insecurity: Where Are the Most Vulnerable Places in Africa? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Locating Climate Insecurity: Where Are the Most Vulnerable Places in Africa? Agency/Company /Organization: The Robert Strauss Center Topics: Co-benefits assessment, Background analysis Resource Type: Publications Website: ccaps.strausscenter.org/system/research_items/pdfs/19/original.pdf?128 UN Region: "Sub-Saharan Africa" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property.

345

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

346

Space reactor system and subsystem investigations: assessment of technology issues for the reactor and shield subsystem. SP-100 Program  

SciTech Connect

As part of Rockwell's effort on the SP-100 Program, preliminary assessment has been completed of current nuclear technology as it relates to candidate reactor/shield subsystems for the SP-100 Program. The scope of the assessment was confined to the nuclear package (to the reactor and shield subsystems). The nine generic reactor subsystems presented in Rockwell's Subsystem Technology Assessment Report, ESG-DOE-13398, were addressed for the assessment.

Atkins, D.F.; Lillie, A.F.

1983-06-30T23:59:59.000Z

347

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

348

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

349

Department of Energy Resource Assessment Program 5-year plan, FY 1991--FY 1995  

DOE Green Energy (OSTI)

The US Department of Energy's (DOE) Resource Assessment Program produces scientific descriptions and assessments of the nation's renewable energy resources, such as solar energy. Information about the resources --- for example, how solar energy varies with location and climate --- is required to develop energy conversion technologies, design and site systems, and forecast the systems' performance. With information about resource availability and renewable energy system performance, DOE can assess the potential for renewable energy to contribute to the nation's energy supply as part of the long-term national energy strategy. This 5-year plan for fiscal years (FY) 1991 through 1995 gives the strategy to produce solar radiation resource characterizations and assessments under the DOE project at SERI. It is consistent with the mini-multiyear plan for resource assessment prepared by DOE in 1989 and incorporates the comments received at a project overview held in April 1990 at DOE Headquarters. 7 figs.

Not Available

1990-10-01T23:59:59.000Z

350

Department of Energy Resource Assessment Program 5-year plan, FY 1991--FY 1995  

SciTech Connect

The US Department of Energy's (DOE) Resource Assessment Program produces scientific descriptions and assessments of the nation's renewable energy resources, such as solar energy. Information about the resources --- for example, how solar energy varies with location and climate --- is required to develop energy conversion technologies, design and site systems, and forecast the systems' performance. With information about resource availability and renewable energy system performance, DOE can assess the potential for renewable energy to contribute to the nation's energy supply as part of the long-term national energy strategy. This 5-year plan for fiscal years (FY) 1991 through 1995 gives the strategy to produce solar radiation resource characterizations and assessments under the DOE project at SERI. It is consistent with the mini-multiyear plan for resource assessment prepared by DOE in 1989 and incorporates the comments received at a project overview held in April 1990 at DOE Headquarters. 7 figs.

1990-10-01T23:59:59.000Z

351

Thermal Energy Storage Evaluation Program: 1986 annual report. [Economic planning, technical assessment, field tests  

DOE Green Energy (OSTI)

The Thermal Energy Storage Evaluation Program activities were initiated to provide economic planning, technical assessment and field testing support for the thermal energy storage program, as well as management of the overall program for the DOE. Economic planning included two assessment studies. In technical assessment, issues that might affect an assessment were outlined for the development of a standard methodology to conduct assessments; work is underway to establish ''market-based'' cost and performance goals for cool storage technologies in residential applications; planning has begun for investigation of benefits in incorporating aquifer thermal energy storage with heat pumps; and plans are being formulated to evaluate the potential benefit of using aquifer thermal energy storage to augment power plant cooling. Field testing to develop technologies for the recovery and reuse of industrial waste heat began with the instrumentation design for the ceramic/salt matrix in an operating brick-making plant. Work in advanced studies by Lawrence Berkeley Laboratory continued on thermochemical conversion and storage using small particles as the heat exchanger catalyst. In SO/sub 3/ dissociation experiments at 645/sup 0/C using light and dark conditions, results clearly demonstrated the benefit in directly radiantly heating the catalyst to accomplish the endothermic step of a thermochemical storage reaction.

Drost, M.K.; Bates, J.M.; Brown, D.R.; Weijo, R.O.

1987-07-01T23:59:59.000Z

352

Environmental Restoration Program waste minimization and pollution prevention self-assessment  

Science Conference Proceedings (OSTI)

The Environmental Restoration (ER) Program within Martin Marietta Energy Systems, Inc. is currently developing a more active waste minimization and pollution prevention program. To determine areas of programmatic improvements within the ER Waste Minimization and Pollution Prevention Awareness Program, the ER Program required an evaluation of the program across the Oak Ridge K-25 Site, the Oak Ridge National Laboratory, the Oak Ridge Y-12 Plant, the Paducah Environmental Restoration and Waste Minimization Site, and the Portsmouth Environmental Restoration and Waste Minimization Site. This document presents the status of the overall program as of fourth quarter FY 1994, presents pollution prevention cost avoidance data associated with FY 1994 activities, and identifies areas for improvement. Results of this assessment indicate that the ER Waste Minimization and Pollution Prevention Awareness Program is firmly established and is developing rapidly. Several procedural goals were met in FY 1994 and many of the sites implemented ER waste minimization options. Additional growth is needed, however, for the ER Waste Minimization and Pollution Prevention Awareness Program.

Not Available

1994-10-01T23:59:59.000Z

353

Hawaii Geothermal Resource Assessment Program: western state cooperative direct heat resource assessment, Phase I. Final report  

DOE Green Energy (OSTI)

A regional geothermal resource assessment has been conducted for the major islands in the Hawaiian chain. The assessment was made through the compilation and evaluation of the readily accessible geological, geochemical, and geophysical data for the Hawaiian archipelago which has been acquired during the last two decades. The geologic criteria used in the identification of possible geothermal reservoirs were: age and location of most recent volcanism on the island and the geologic structure of each island. The geochemical anomalies used as traces for geothermally altered ground water were: elevated silica concentrations and elevated chloride/magnesium ion ratios. Geophysical data used to identify subsurface structure which may have geothermal potential were: aeromagnetic anomalies, gravity anomalies, and higher than normal well and basal spring discharge temperatures. Geophysical and geochemical anomalies which may be the result of subsurface thermal effects have been identified on the islands of Hawaii, Maui, Molokai and Oahu.

Not Available

1978-01-01T23:59:59.000Z

354

Actual vs anticipated savings from DSM programs: An assessment of the California experience  

SciTech Connect

Since the late 1980`s, utilities in California have used demand-side management (DSM) extensively to achieve a variety of corporate and public policy goals. This commitment to ene efficiency was encouraged by the establishment of financial incentives for the utilities to acquire demand-side resources. With restructuring of electric and gas markets underway in California, including recent cutbacks by the California utilities in their DSM program efforts, it is timely to review retrospectively the accomplishments of California`s DSM investments. This paper summarizes the results of 50 evaluation studies that assess California DSM programs operating between 1990 and 1992. On average, the programs delivered 112% of the energy savings that were planned, and the typical program realized approximately 86% of the energy savings it was expected to deliver. Thus, the California DSM programs outperformed DSM programs from the 1980s, in terms of more accurately forecasting energy impacts. Among the 50 impact studies, lower realization rates are associated with residential-sector programs, relatively high ex-ante estimates of savings, and significant levels of free ridership.

Brown, M.A. [Oak Ridge National Lab., TN (United States); Mihlmester, P.E. [Aspen Systems Corp., Oak Ridge, TN (United States)

1995-06-01T23:59:59.000Z

355

V-211: IBM iNotes Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability

356

The North American Regional Climate Change Assessment Program: Overview of Phase I Results  

SciTech Connect

The North American Regional Climate Change Assessment Program is an international effort designed to systematically investigate the uncertainties in regional scale projections of future climate and produce high resolution climate change scenarios using multiple regional climate models (RCMs) nested within atmosphere ocean general circulation models (AOGCMs) forced with the A2 SRES scenario, with a common domain covering the conterminous US, northern Mexico, and most of Canada. The program also includes an evaluation component (Phase I) wherein the participating RCMs are nested within 25 years of NCEP/DOE global reanalysis II. The grid spacing of the RCM simulations is 50 km.

Mearns, L. O.; Arritt, R.; Biner, S.; Bukovsky, Melissa; McGinnis, Seth; Sain, Steve; Caya, Daniel; Correia Jr., James; Flory, Dave; Gutowski, William; Takle, Gene; Jones, Richard; Leung, Lai-Yung R.; Moufouma-Okia, Wilfran; McDaniel, Larry; Nunes, A.; Qian, Yun; Roads, J.; Sloan, Lisa; Snyder, Mark A.

2012-09-20T23:59:59.000Z

357

Pollution prevention opportunity assessment for Sandia National Laboratories/California recycling programs.  

SciTech Connect

This Pollution Prevention Opportunity Assessment (PPOA) was conducted for the Sandia National Laboratories/California (SNL/CA) Environmental Management Department between May 2006 and March 2007, to evaluate the current site-wide recycling program for potential opportunities to improve the efficiency of the program. This report contains a summary of the information collected and analyses performed with recommended options for implementation. The SNL/NM Pollution Prevention (P2) staff worked with the SNL/CA P2 Staff to arrive at these options.

Wrons, Ralph Jordan; Vetter, Douglas Walter

2007-07-01T23:59:59.000Z

358

Waste Isolation Pilot Plant Medical Screening Program, Phase I: Needs Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Waste Isolation Pilot Plant Waste Isolation Pilot Plant Medical Screening Program Phase I: Needs Assessment Presented to the Office of Worker Screening and Compensation Support, Office of Health, Safety, and Security U.S. Department of Energy Prepared by Queens College, City University of New York United Steelworkers Original Draft: August 22, 2011 Updated Version: May 1, 2012 Table of Contents Summary.............................................................................3 I. Background on the Former Worker Program................................4 II. History of the WIPP Facility......................................................4 III. Scope of this Report.................................................................7 IV. Exposure Characterization........................................................8

359

Preliminary nuclear safety assessment of the NEPST (Topaz II) space reactor program  

SciTech Connect

The United States (US) Strategic Defense Initiative Organization (SDIO) decided to investigate the possibility of launching a Russian Topaz II space nuclear power system. A preliminary nuclear safety assessment was conducted to determine whether or not a space mission could be conducted safely and within budget constraints. As part of this assessment, a safety policy and safety functional requirements were developed to guide both the safety assessment and future Topaz II activities. A review of the Russian flight safety program was conducted and documented. Our preliminary nuclear safety assessment included a number of deterministic analyses, such as; neutronic analysis of normal and accident configurations, an evaluation of temperature coefficients of reactivity, a reentry and disposal analysis, an analysis of postulated launch abort impact accidents, and an analysis of postulated propellant fire and explosion accidents. Based on the assessment to date, it appears that it will be possible to safely launch the Topaz II system in the US with a modification to preclude water flooded criticality. A full scale safety program is now underway.

Marshall, A.C.

1993-01-01T23:59:59.000Z

360

Liquefied gaseous fuels safety and environmental control assessment program: third status report  

Science Conference Proceedings (OSTI)

This Status Report contains contributions from all contractors currently participating in the DOE Liquefied Gaseous Fuels (LG) Safety and Environmental Control Assessment Program and is presented in two principal sections. Section I is an Executive Summary of work done by all program participants. Section II is a presentation of fourteen individual reports (A through N) on specific LGF Program activities. The emphasis of Section II is on research conducted by Lawrence Livermore National Laboratory (Reports A through M). Report N, an annotated bibliography of literature related to LNG safety and environmental control, was prepared by Pacific Northwest Laboratory (PNL) as part of its LGF Safety Studies Project. Other organizations who contributed to this Status Report are Aerojet Energy Conversion Company; Applied Technology Corporation; Arthur D. Little, Incorporated; C/sub v/ International, Incorporated; Institute of Gas Technology; and Massachusetts Institute of Technology. Separate abstracts have been prepared for Reports A through N for inclusion in the Energy Data Base.

Not Available

1982-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Expanding the Industrial Assessment Center Program: Building an Industrial Efficiency Workforce  

E-Print Network (OSTI)

Energy efficiency provides an unequaled opportunity for manufacturing companies to reduce operating costs. Energy efficiency improvements not only lead to reduced energy costs, they can lead to even greater improved productivity and decreased waste. However, many cost-effective projects are not being implemented. Manufacturing companies have indicated that this is often due not to a lack of funds but rather to a lack of access to technical information and trained workforce. One of the most successful programs for achieving energy efficiency savings in the manufacturing sector is the US Department of Energy (DOE)'s Industrial Assessment Center (IAC) program. In addition to significant energy savings, the IAC program produces a steady stream of energy engineers who are in high demand as plant energy managers, energy efficiency consultants, and energy efficient design engineers. This paper proposes a strategy for expanding the IAC program in both size and scope to better meet the workforce and energy assessment needs of US manufacturers. The expansion would be accomplished by establishing Centers of Excellence at current IAC locations, and then partnering with other universities, community colleges, and trade schools to create satellite centers to educate students at all technical levels. This would provide additional assistance to industrial customers over larger regions than is currently possible. Further partnerships with other organizations that already service manufacturing facilities would take advantage of existing infrastructure to enable the most efficient distribution of energy efficiency services.

Trombley, D.; Elliott, R. N.; Chittum, A.

2009-05-01T23:59:59.000Z

362

U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Net4Switch ipswcom ActiveX Control Buffer Overflow 8: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability February 22, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Net4Switch ipswcom ActiveX Control, which can be exploited by malicious people to compromise a user's system. PLATFORM: Net4Switch ipswcom ActiveX Control 1.x ABSTRACT: The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string. reference LINKS: Vendor Advisory Secunia Advisroy 48125 No CVE references. IMPACT ASSESSMENT: High Discussion: The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

363

V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Kingsoft Writer 2012 WPS Font Names Buffer Overflow 19: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability August 16, 2013 - 5:52am Addthis PROBLEM: Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system. PLATFORM: Kingsoft Office 2012, Kingsoft Weirwe 2012 8.x ABSTRACT: The vulnerability is confirmed in the following products and versions: * Kingsoft Writer 2012 version 8.1.0.3030. * Kingsoft Writer 2012 bundled in Kingsoft Office 2012 version 8.1.0.3385. REFERENCE LINKS: Secunia Advisory SA53266 CVE-2013-3934 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to a boundary error in when handling font names and can be exploited to cause a stack-based buffer overflow via a

364

U-018: Oracle AutoVue ActiveX Control Insecure Method Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Oracle AutoVue ActiveX Control Insecure Method 18: Oracle AutoVue ActiveX Control Insecure Method Vulnerabilities U-018: Oracle AutoVue ActiveX Control Insecure Method Vulnerabilities October 25, 2011 - 8:45am Addthis PROBLEM: Oracle AutoVue ActiveX Control Insecure Method Vulnerabilities. PLATFORM: The vulnerabilities are confirmed in version 20.0.2 build 7910 (AutoVueX.ocx 20.1.1.7910). Other versions may also be affected. ABSTRACT: Successful exploitation of the vulnerabilities allows execution of arbitrary code. reference LINKS: Bugtraq ID: 50321 Secunia Advisory SA46473 Oracle AutoVue IMPACT ASSESSMENT: High Discussion: Successfully exploiting this issue will allow attackers to create or overwrite arbitrary files on the victim's computer within the context of the affected application (typically Internet Explorer) that uses the

365

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

366

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

367

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

368

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

369

V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat Security Bypass and Denial of Service 7: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities November 6, 2012 - 6:00am Addthis PROBLEM: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities PLATFORM: Apache Tomcat 5.x Apache Tomcat 6.x Apache Tomcat 7.x ABSTRACT: Two vulnerabilities were reported in Apache Tomcat REFERENCE LINKS: Apache.org Apache Tomcat Denial of Service Apache Tomcat DIGEST authentication weaknesses Secunia Advisory SA51138 CVE-2012-2733 CVE-2012-3439 IMPACT ASSESSMENT: Medium DISCUSSION: A weakness and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). 1) An error within the "parseHeaders()" function

370

U-172: OpenOffice.org Two Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: OpenOffice.org Two Vulnerabilities 72: OpenOffice.org Two Vulnerabilities U-172: OpenOffice.org Two Vulnerabilities May 18, 2012 - 7:00am Addthis PROBLEM: OpenOffice.org Two Vulnerabilities PLATFORM: OpenOffice.org 3.3, Other versions may also be affected. ABSTRACT: Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system. Reference LINKS: Secunia Advisory SA46992 CVE-2012-1149 CVE-2012-2149 IMPACT ASSESSMENT: High Discussion: 1) An integer overflow error in the vclmi.dll module when allocating memory for an embedded image object can be exploited to cause a heap-based buffer overflow e.g. via a specially crafted JPEG object within a DOC file. 2) An error within libwpd when parsing Wordperfect documents can be exploited to overwrite arbitrary memory via a specially crafted Wordperfect

371

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Telnet code execution vulnerability: FreeBSD and Kerberos 69: Telnet code execution vulnerability: FreeBSD and Kerberos U-069: Telnet code execution vulnerability: FreeBSD and Kerberos December 27, 2011 - 5:18am Addthis PROBLEM: Telnet code execution vulnerability: FreeBSD and Kerberos PLATFORM: Operating System: FreeBSD 7.1, 7.3, 8.0 and 8.1 and Software: Kerberos ABSTRACT: Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. reference LINKS: FreeBSD-SA-11:08.telnetd MITKRB5-SA-2011-008 Secunia Advisory: SA47397 (FreeBSD) Secunia Advisory: SA47348 (Kerberos) SecurityTracker Alert ID: 1026460 CVE-2011-4862 IMPACT ASSESSMENT: High Discussion: When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. The telnet

372

V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache Struts "ParameterInterceptor" Security Bypass 2: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability May 23, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache Struts PLATFORM: The vulnerability is reported in versions prior to 2.3.14.1 ABSTRACT: A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA53495 Apache Struts Advisory S2-012 Apache Struts Advisory S2-013 CVE-2013-1965 CVE-2013-1966 IMPACT ASSESSMENT: High DISCUSSION: A request that included a specially crafted request parameter could be used to inject arbitrary OGNL code into the stack, afterward used as request

373

V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: FreeType BDF Glyph Processing Buffer Overflow Vulnerability 6: FreeType BDF Glyph Processing Buffer Overflow Vulnerability V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability December 27, 2012 - 6:00am Addthis PROBLEM: FreeType BDF Glyph Processing Buffer Overflow Vulnerability PLATFORM: Version(s): prior to 2.4.11 ABSTRACT: Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027921 CVE-2012-5668 CVE-2012-5669 CVE-2012-5670 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted font file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user or application. A null pointer dereference can be triggered in bdf_free_font()

374

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apache OFBiz Cross-Site Scripting and Code Execution 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected. references LINKS: Vendor Advisory Secunia Advisory 48800 CVE-2012-1621 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code

375

T-572: VMware ESX/ESXi SLPD denial of service vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: VMware ESX/ESXi SLPD denial of service vulnerability 72: VMware ESX/ESXi SLPD denial of service vulnerability T-572: VMware ESX/ESXi SLPD denial of service vulnerability March 8, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in VMware ESX. A remote user can cause denial of service conditions. PLATFORM: ESX/ESXi 4.0, 4.1 ABSTRACT: VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm. reference LINKS: VMware Security Advisory: VMSA-2011-0004 VMware vSphere 4 VMware ESXi 4.1 Update CVE-2010-3609 IMPACT ASSESSMENT: Moderate Discussion: A remote user can send specially crafted data to cause the target Service Location Protocol daemon (SLPD) to enter an infinite loop and consume excessive CPU resources.A remote user can consume excessive CPU resources.

376

V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Novell iPrint Client Unspecified Buffer Overflow 8: Novell iPrint Client Unspecified Buffer Overflow Vulnerability V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability May 3, 2013 - 6:00am Addthis PROBLEM: Novell iPrint Client Unspecified Buffer Overflow Vulnerability PLATFORM: Novell iPrint Client 5.x ABSTRACT: A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system REFERENCE LINKS: Secunia Advisory SA53261 Novell KB 7012344 Novell KB 7008708 CVE-2013-1091 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an unspecified error and can be exploited to cause a stack-based buffer overflow. IMPACT: Successful exploitation may allow execution of arbitrary code SOLUTION: Vendor recommendation is to update to Version 5.90

377

Visualization & Controls Program Peer Review | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Visualization & Controls Program Peer Review Visualization & Controls Program Peer Review Visualization & Controls Program Peer Review With mounting evidence suggesting an increased probability that malicious attacks may be launched against energy control systems, there is a critical need to understand specific cyber vulnerabilities and corresponding mitigation strategies. This need is being addressed by SCADA/ Energy Management System (EMS) Cyber Security Assessments conducted at the National SCADA Test Bed (NSTB) facility at INL and at on-site field installations of control systems. Visualization & Controls Program Peer Review More Documents & Publications DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan DOE National SCADA Test Bed Program Multi-Year Plan Vulnerability Analysis of Energy Delivery Control Systems - 2011

378

NV: Nessus Vulnerability Visualization for the Web  

SciTech Connect

Network vulnerability is a critical component of network se- curity. Yet vulnerability analysis has received relatively lit- tle attention from the security visualization community. In this paper we describe nv, a web-based Nessus vulnerability visualization. Nv utilizes treemaps and linked histograms to allow system administrators to discover, analyze, and man- age vulnerabilities on their networks. In addition to visual- izing single Nessus scans, nv supports the analysis of sequen- tial scans by showing which vulnerabilities have been fixed, remain open, or are newly discovered. Nv was also designed to operate completely in-browser, to avoid sending sensitive data to outside servers. We discuss the design of nv, as well as provide case studies demonstrating vulnerability analysis workflows which include a multiple-node testbed and data from the 2011 VAST Challenge.

Harrison, Lane [University of North Carolina, Charlotte; Spahn, Riley B [ORNL; Iannacone, Michael D [ORNL; Downing, Evan P [ORNL; Goodall, John R [ORNL

2012-01-01T23:59:59.000Z

379

CERTS 2012 Program Review - Reliability Standards Analysis and Assessment - Gil Tam, EPG  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12-13, 2012 12-13, 2012 Washington, DC FY12 DOE/CERTS Transmission Reliability R&D Internal Program Review Research Projects Reliability Standards Analysis and Assessments  Frequency Response Event Collection and Analysis  NERC Interconnections 2011 Annual Grid Reliability Performance Analysis and Report Page 1 Reliability Standards Analysis and Assessment  Objective: Support the NERC committees/groups (Resource Subcommittee and RS- Frequency Working Group) in the following ways: - Perform grid reliability metrics analysis using data collected in CERTS applications as requested by the RS - Analyze collected data to assess reliability performance at different levels - Interconnection, Reliability Coordinator, Balancing Authority - Perform analysis, testing, and monitoring of current and proposed

380

Commercial equipment loads: End-Use Load and Consumer Assessment Program (ELCAP)  

SciTech Connect

The Office of Energy Resources of the Bonneville Power Administration is generally responsible for the agency's power and conservation resource planning. As associated responsibility which supports a variety of office functions is the analysis of historical trends in and determinants of energy consumption. The Office of Energy Resources' End-Use Research Section operates a comprehensive data collection program to provide pertinent information to support demand-side planning, load forecasting, and demand-side program development and delivery. Part of this on-going program is known as the End-Use Load and Consumer Assessment Program (ELCAP), an effort designed to collect electricity usage data through direct monitoring of end-use loads in buildings. This program is conducted for Bonneville by the Pacific Northwest Laboratory. This report provides detailed information on electricity consumption of miscellaneous equipment from the commercial portion of ELCAP. Miscellaneous equipment includes all commercial end-uses except heating, ventilating, air conditioning, and central lighting systems. Some examples of end-uses covered in this report are office equipment, computers, task lighting, refrigeration, and food preparation. Electricity consumption estimates, in kilowatt-hours per square food per year, are provided for each end-use by building type. The following types of buildings are covered: office, retail, restaurant, grocery, warehouse, school, university, and hotel/motel. 6 refs., 35 figs., 12 tabs.

Pratt, R.G.; Williamson, M.A.; Richman, E.E.; Miller, N.E.

1990-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Mining Bug Databases for Unidentified Software Vulnerabilities  

SciTech Connect

Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

2012-06-01T23:59:59.000Z

382

U-198: IBM Lotus Expeditor Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system..

383

Vulnerability analysis of three remote voting methods  

E-Print Network (OSTI)

This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.

Enguehard, Chantal

2009-01-01T23:59:59.000Z

384

US Energy Sector Vulnerabilities to Climate Change  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This...

385

Multics Security Evaluation (Volume II): Vulnerability Analysis  

Science Conference Proceedings (OSTI)

Page 1. ESD-TR-74-J93, Vor. II ' MULTICS SECURITY EVALUATION: VULNERABILITY ANALYSIS Pau r A. Karger, 2Lt ...

2013-04-15T23:59:59.000Z

386

Toward a Resiliency and Vulnerability Observatory Network ...  

Science Conference Proceedings (OSTI)

... is already undertaking extensive investment in its ... vulnerability or more generally, equity, should permeate all ... etc.), parcel and/or tax portfolio data ...

2009-02-05T23:59:59.000Z

387

Program Evaluation - Automotive Lightweighting Materials Program Research and Development Projects Assessment of Benefits - Case Studies No. 2  

SciTech Connect

This report is the second of a series of studies to evaluate research and development (R&D) projects funded by the Automotive Lightweighting Materials (ALM) Program of the Office of Advanced Automotive Technologies (OAAT) of the U.S. Department of Energy (DOE). The objectives of the program evaluation are to assess short-run outputs and long-run outcomes that may be attributable to the ALM R&D projects. The ALM program focuses on the development and validation of advanced technologies that significantly reduce automotive vehicle body and chassis weight without compromising other attributes such as safety, performance, recyclability, and cost. Funded projects range from fundamental materials science research to applied research in production environments. Collaborators on these projects include national laboratories, universities, and private sector firms, such as leading automobile manufacturers and their suppliers. Three ALM R&D projects were chosen for this evaluation: Design and Product Optimization for Cast Light Metals, Durability of Lightweight Composite Structures, and Rapid Tooling for Functional Prototyping of Metal Mold Processes. These projects were chosen because they have already been completed. The first project resulted in development of a comprehensive cast light metal property database, an automotive application design guide, computerized predictive models, process monitoring sensors, and quality assurance methods. The second project, the durability of lightweight composite structures, produced durability-based design criteria documents, predictive models for creep deformation, and minimum test requirements and suggested test methods for establishing durability properties and characteristics of random glass-fiber composites for automotive structural composites. The durability project supported Focal Project II, a validation activity that demonstrates ALM program goals and reduces the lead time for bringing new technology into the marketplace. Focal projects concentrate on specific classes of materials and nonproprietary components and are done jointly by DOE and the Automotive Composites Consortium of U.S. Council for Automotive Research (USCAR). The third project developed a rapid tooling process that reduces tooling time, originally some 48-52 weeks, to less than 12 weeks by means of rapid generation of die-casting die inserts and development of generic holding blocks, suitable for use with large casting applications. This project was conducted by the United States Automotive Materials Partnership, another USCAR consortium.

Das, S.

2003-01-23T23:59:59.000Z

388

Wildfire ignition resistant home design(WIRHD) program: Full-scale testing and demonstration final report.  

SciTech Connect

The primary goal of the Wildfire ignition resistant home design(WIRHD) program was to develop a home evaluation tool that could assess the ignition potential of a structure subjected to wildfire exposures. This report describes the tests that were conducted, summarizes the results, and discusses the implications of these results with regard to the vulnerabilities to homes and buildings.

Quarles, Stephen, L.; Sindelar, Melissa

2011-12-13T23:59:59.000Z

389

Hawaii energy strategy project 3: Renewable energy resource assessment and development program  

DOE Green Energy (OSTI)

RLA Consulting (RLA) has been retained by the State of Hawaii Department of Business, Economic Development and Tourism (DBEDT) to conduct a Renewable Energy Resource Assessment and Development Program. This three-phase program is part of the Hawaii Energy Strategy (HES), which is a multi-faceted program intended to produce an integrated energy strategy for the State of Hawaii. The purpose of Phase 1 of the project, Development of a Renewable Energy Resource Assessment Plan, is to better define the most promising potential renewable energy projects and to establish the most suitable locations for project development in the state. In order to accomplish this goal, RLA has identified constraints and requirements for renewable energy projects from six different renewable energy resources: wind, solar, biomass, hydro, wave, and ocean thermal. These criteria were applied to areas with sufficient resource for commercial development and the results of Phase 1 are lists of projects with the most promising development potential for each of the technologies under consideration. Consideration of geothermal energy was added to this investigation under a separate contract with DBEDT. In addition to the project lists, a monitoring plan was developed with recommended locations and a data collection methodology for obtaining additional wind and solar data. This report summarizes the results of Phase 1. 11 figs., 22 tabs.

NONE

1995-11-01T23:59:59.000Z

390

U.S. Postal Service radon assessment and mitigation program. Progress report, September 1993--November 1994  

SciTech Connect

In 1992, the US Postal Service (USPS) entered into an Interagency Agreement with the Department of Energy (DOE) whereby DOE would provide technical assistance in support of the USPS Radon Assessment and Mitigation Program. To aid in this effort, DOE tasked the Hazardous Waste Remedial Actions Program (HAZWRAP), which is managed by Martin Marietta Energy Systems, Inc., for DOE under contract AC05-84OR21400. Since that time, HAZWRAP has developed and finalized the sampling protocol, mitigation diagnostic protocol, and the quality assurance and quality control procedures. These procedures were validated during the Protocol Validation (1992-1993) and Pilot Study (1993-1994) phases of the program. To date, HAZWRAP has performed approximately 16,000 radon measurements in 250 USPS buildings. Mitigation diagnostics have been performed in 27 buildings. Thus far, 13% of the measurements have been above the Environmental Protection Agency action level of 4 pCi/L. This report summarizes the pilot program radon testing data and mitigation diagnostic data for 22 sites and contains recommendations for mitigation diagnostics.

Velazquez, L.E.; Petty, J.L. Jr.

1994-12-31T23:59:59.000Z

391

Department of Energy Small-Scale Hydropower Program: Feasibility assessment and technology development summary report  

DOE Green Energy (OSTI)

This report summarizes two subprograms under the US Department of Energy's Small-Scale Hydroelectric Power Program. These subprograms were part of the financial assistance activities and included the Program Research and Development Announcement (PRDA) feasibility assessments and the technology development projects. The other major subprograms included engineering research and development, legal and institutional aspects, and technology transfer. These other subprograms are covered in their respective summary reports. The problems of energy availability and increasing costs of energy led to a national effort to develop economical and environmental attractive alternative energy resources. One such alternative involved the utilization of existing dams with hydraulic heads of <65 ft and the capacity to generate hydroelectric power of 15 MW or less. Thus, the PRDA program was initiated along with the Technology Development program. The purpose of the PRDA feasibility studies was to encourage development of renewable hydroelectric resources by providing engineering, economic, environmental, safety, and institutional information. Fifty-five feasibility studies were completed under the PRDA. This report briefly summarizes each of those projects. Many of the PRDA projects went on to become technology development projects. 56 refs., 1 fig., 2 tabs.

Rinehart, B.N.

1991-06-01T23:59:59.000Z

392

Department of Energy Small-Scale Hydropower Program: Feasibility assessment and technology development summary report  

Science Conference Proceedings (OSTI)

This report summarizes two subprograms under the US Department of Energy's Small-Scale Hydroelectric Power Program. These subprograms were part of the financial assistance activities and included the Program Research and Development Announcement (PRDA) feasibility assessments and the technology development projects. The other major subprograms included engineering research and development, legal and institutional aspects, and technology transfer. These other subprograms are covered in their respective summary reports. The problems of energy availability and increasing costs of energy led to a national effort to develop economical and environmental attractive alternative energy resources. One such alternative involved the utilization of existing dams with hydraulic heads of hydroelectric power of 15 MW or less. Thus, the PRDA program was initiated along with the Technology Development program. The purpose of the PRDA feasibility studies was to encourage development of renewable hydroelectric resources by providing engineering, economic, environmental, safety, and institutional information. Fifty-five feasibility studies were completed under the PRDA. This report briefly summarizes each of those projects. Many of the PRDA projects went on to become technology development projects. 56 refs., 1 fig., 2 tabs.

Rinehart, B.N.

1991-06-01T23:59:59.000Z

393

Annual Coded Wire Tag Program; Oregon Stock Assessment, 2001 Annual Report.  

DOE Green Energy (OSTI)

This annual report is in fulfillment of contract obligations with Bonneville Power Administration which is the funding source for the Oregon Department of Fish and Wildlife project 'Annual Stock Assessment - Coded Wire Tag Program (ODFW)'. Results for the 2001 contract period: Objective 1--Over 1 million juvenile salmon were coded-wire by this program (Table 1); Objective 2--ODFW recovered and processed over 40,000 snout collected from coded-wire tagged fish (Table 2); Objective 3--Survival data is summarized below; Objective 4--The last group of VIE tagged coho was released in 2001 and returning coho were samples at Sandy Hatchery. This sampling showed only 1 of 1,160 returning coho VIE marked as juveniles retained the VIE mark as adults.

Lewis, Mark; Mallette, Christine; Murray, William

2002-03-01T23:59:59.000Z

394

Insolation resource assessment program plan. Fiscal year 1979--Fiscal year 1981. [Includes glossary  

SciTech Connect

The purpose of the Insolation Resource Assessment Program is to collect, standardize, certify, process,, and archive geophysical data for solar energy applications. The principal solar parameters to be measured are global, direct, diffuse and total radiation on an inclined surface. The measurement of the spectral distribution of solar radiation is also important to the development of several technologies. The aim of many of the completed, current, and planned projects presented in the IRAP Plan is to improve solar data collection methods and procedures and to refine solar radiation forecasting capabilities.

1979-01-01T23:59:59.000Z

395

Preliminary assessment report for Fort Jacob F. Wolters, Installation 48555, Mineral Wells, Texas. Installation Restoration Program  

SciTech Connect

This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Texas Army National Guard (TXARNG) property near Mineral Wells, Texas. Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing preremedial activities and to provide a basis for establishing corrective actions in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining site activities, quantities of hazardous substances present, and potential pathways by which contamination could affect public health and the environment. This PA satisfies, for the Fort Wolters property, the requirement of the Department of Defense Installation Restoration Program.

Dennis, C.B.

1993-08-01T23:59:59.000Z

396

Preliminary assessment report for Waiawa Gulch, Installation 15080, Pearl City, Oahu, Hawaii. Installation Restoration Program  

SciTech Connect

This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Hawaii Army National Guard (HIARNG) property near Pearl City, Oahu, Hawaii. Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing preremedial activities and to provide a basis for establishing corrective actions in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining site activities, quantities of hazardous substances present, and potential pathways by which contamination could affect public health and the environment. This PA satisfies, for the Waiawa Gulch property, phase I of the Department of Defense Installation Restoration Program (IRP).

Not Available

1993-08-01T23:59:59.000Z

397

Satellite power system concept development and evaluation program system definition technical assessment report  

DOE Green Energy (OSTI)

The results of the system definition studies conducted by NASA as a part of the Department of Energy/National Aeronautics and Space Administration SPS Concept Development and Evaluation Program are summarized. The purpose of the system definition efforts was to identify and define candidate SPS concepts and to evaluate the concepts in terms of technical and cost factors. Although the system definition efforts consisted primarily of evaluation and assessment of alternative technical approaches, a reference system was also defined to facilitate economic, environmental, and societal assessments by the Department of Energy. This reference system was designed to deliver 5 GW of electrical power to the utility grid. Topics covered include system definition; energy conversion and power management; power transmission and reception; structures, controls, and materials; construction and operations; and space transportation.

Not Available

1980-12-01T23:59:59.000Z

398

NNSA NSO Technical Qualification Program Accreditation Self Assessment Report, October 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IAl,W~\/Al IAl,W~\/Al llVl'~~t Nalional N uciea1 S ecurity Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 FEB 0 . ~ 2010 Patricia R. Worthington, Director, Office of Health and Safety, DOE/HQ (HS-10) GTN NATIONAL NUCLEAR SECURITY ADMINISTRATION NEV ADA SITE OFFICE (NNSA/NSO) TECHNICAL QUALIFICATION PROGRAM (TQP) ACCREDITATION NNSA/NSO recently completed the attached TQP Self-Assessment. Based on the completion of this self assessment, I am formally requesting TQP Accreditation from your office. Barry L. Mellor, NNSA/NSO Training Manager, has been working with Ali H. Ghovanlou in preparation for this event. We would like to schedule the accreditation team for June, 2010.

399

Assessment of Achievable Potential from Energy Efficiency and Demand Response Programs in the U.S. (2010 - 2030)  

Science Conference Proceedings (OSTI)

This report documents the results of an exhaustive study to assess the achievable potential for electricity energy savings and peak demand reduction from energy efficiency and demand response programs through 2030. This achievable potential represents an estimated range of savings attainable through programs that encourage adoption of energy-efficient technologies, taking into consideration technical, economic, and market constraints.

2009-01-14T23:59:59.000Z

400

Assessing the Costs and Benefits of the Superior Energy Performance Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Costs and Benefits of the Superior Energy Performance Program Costs and Benefits of the Superior Energy Performance Program Title Assessing the Costs and Benefits of the Superior Energy Performance Program Publication Type Conference Paper Refereed Designation Unknown LBNL Report Number LBNL-6349E Year of Publication 2013 Authors Therkelsen, Peter, Aimee T. McKane, Ridah Sabouni, and Tracy Evans Conference Name American Council for an Energy-Efficient Economy (ACEEE) Summer Study on Energy Efficiency in Industry Date Published 07/2013 Keywords ACEEE Conference Paper, energy efficiency, Energy Performance Program Abstract Industrial companies are seeking to manage energy consumption and costs, mitigate risks associated with energy, and introduce transparency into reports of their energy performance achievements. Forty industrial facilities are participating in the U.S. DOE supported Superior Energy Performance (SEP) program in which facilities implement an energy management system based on the ISO 50001 standard, and pursue third-party verification of their energy performance improvements. SEP certification provides industrial facilities recognition for implementing a consistent, rigorous, internationally recognized business process for continually improving energy performance and achievement of established energy performance improvement targets. This paper focuses on the business value of SEP and ISO 50001, providing an assessment of the costs and benefits associated with SEP implementation at nine SEP-certified facilities across a variety of industrial sectors. These cost-benefit analyses are part of the U.S. DOE's contribution to the Global Superior Energy Performance (GSEP) partnership, a multi-country effort to demonstrate, using facility data, that energy management system implementation enables companies to improve their energy performance with a greater return on investment than business-as-usual (BAU) activity. To examine the business value of SEP certification, interviews were conducted with SEPcertified facilities. The costs of implementing the SEP program, including internal facility staff time, are described and a marginal payback of SEP certification has been determined. Additionally, more qualitative factors with regard to the business value and challenges related to SEP and ISO 50001 implementation are summarized.

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

The Lifecycle of Bayesian Network Models Developed for Multi-Source Signature Assessment of Nuclear Programs  

Science Conference Proceedings (OSTI)

The Multi-Source Signatures for Nuclear Programs project, part of Pacific Northwest National Laboratorys (PNNL) Signature Discovery Initiative, seeks to computationally capture expert assessment of multi-type information such as text, sensor output, imagery, or audio/video files, to assess nuclear activities through a series of Bayesian network (BN) models. These models incorporate knowledge from a diverse range of information sources in order to help assess a countrys nuclear activities. The models span engineering topic areas, state-level indicators, and facility-specific characteristics. To illustrate the development, calibration, and use of BN models for multi-source assessment, we present a model that predicts a countrys likelihood to participate in the international nuclear nonproliferation regime. We validate this model by examining the extent to which the model assists non-experts arrive at conclusions similar to those provided by nuclear proliferation experts. We also describe the PNNL-developed software used throughout the lifecycle of the Bayesian network model development.

Gastelum, Zoe N.; White, Amanda M.; Whitney, Paul D.; Gosink, Luke J.; Sego, Landon H.

2013-06-04T23:59:59.000Z

402

Pacific Northwest National Laboratory FY96 evaluation of Integrated Assessment Program  

SciTech Connect

The Pacific Northwest National Laboratory`s Integrated Assessment Program (IAP) is the primary system to assess and monitor overall performance and to drive continuous improvement in the Laboratory. The approach used is a significant departure from the Laboratory`s traditional reliance on auditing methods. It is a move toward the contemporary concepts of measuring organizational performance by encouraging scientific, operational, and business excellence, through self-assessment and strengthening line management accountability for results in product and service quality, safety, and cost. This report describes the approach used (methods and processes), the deployment of that approach in the six Laboratory organizations selected to pilot the approach, and a summary of how the pilot organizations used the results they obtained. Section 3.0 of this report summarizes the top strengths and weaknesses in performance as identified by Division/Directorate self-assessments, Independent Oversight, Internal Audit and peer reviews, and includes the actions that have been, or will be taken, to improve performance in areas that are weak.

NONE

1996-10-01T23:59:59.000Z

403

Decentralized Solar Energy Technology Assessment Program: review of activities (April 1978-December 1979)  

DOE Green Energy (OSTI)

The Decentralized Solar Energy Technology Assessment Program (TAP), sponsored by the Office of Solar Energy, Department of Energy, is a technology assessment and planning activity directed at local communities. Specifically, the objectives of the TAP are: (1) to assess the socioeconomic and institutional impacts of the widespread use of renewable energy technologies; (2) to involve communities in planning for their energy futures; and (3) to plan for local energy development. This report discusses two major efforts of the TAP during the period April 1978 to December 1979: the community TA's and several support studies. Four communities have been contracted to undertake an assessment-planning exercise to examine the role of solar renewable energy technologies in their future. The communities selected are the Southern Tier Central Region of New York State, (STC); Richmond, Kentucky, Kent, Ohio; and Franklin County, Massachusetts. Descriptions and progress to date of the community TA's are presented in detail. Two major support study efforts are also presented. A review of existing literature on the legal and institutional issues relative to the adoption of decentralized solar technologies is summarized. A preliminary analysis of potential socioeconomic impacts and other social considerations relative to decentralized solar technologies is also described.

Bronfman, B.H.; Carnes, S.A.; Schweitzer, M.; Peelle, E.; Enk, G.

1980-05-01T23:59:59.000Z

404

International Code Assessment and Applications Program: Summary of code assessment studies concerning RELAP5/MOD2, RELAP5/MOD3, and TRAC-B. International Agreement Report  

Science Conference Proceedings (OSTI)

Members of the International Code Assessment Program (ICAP) have assessed the US Nuclear Regulatory Commission (USNRC) advanced thermal-hydraulic codes over the past few years in a concerted effort to identify deficiencies, to define user guidelines, and to determine the state of each code. The results of sixty-two code assessment reviews, conducted at INEL, are summarized. Code deficiencies are discussed and user recommended nodalizations investigated during the course of conducting the assessment studies and reviews are listed. All the work that is summarized was done using the RELAP5/MOD2, RELAP5/MOD3, and TRAC-B codes.

Schultz, R.R. [EG and G Idaho, Inc., Idaho Falls, ID (United States)

1993-12-01T23:59:59.000Z

405

T-596: 0-Day Windows Network Interception Configuration Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: 0-Day Windows Network Interception Configuration 6: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can be used to stage potential man-in-the-middle (MITM) attacks on IPv4 traffic. Please see the "Other Links" section below, as it provides an external URL reference. reference LINKS: InfoSec Institute - SLAAC Attack Cisco Threat Comparison and Best-Practice White Paper IMPACT ASSESSMENT: High

406

Diversity Strategies to Mitigate Postulated Common Cause Failure Vulnerabilities  

Science Conference Proceedings (OSTI)

This paper describes an approach to establish effective mitigating strategies that can resolve potential common-cause failure (CCF) vulnerabilities in instrumentation and control (I&C) systems at nuclear power plants. A particular objective in the development of these strategies, which consist of combinations of diversity attributes and their associated criteria, is to address the unique characteristics of digital technology that can contribute to CCF concerns. The research approach employed to establish diversity strategies involves investigation of available documentation on diversity usage and experience from nuclear power and non-nuclear industries, capture of expert knowledge and lessons learned, determination of common practices, and assessment of the nature of CCFs and compensating diversity attributes. The resulting diversity strategies address considerations such as the effect of technology choices, the nature of CCF vulnerabilities, and the prospective impact of each diversity type. In particular, the impact of each attribute and criterion on the purpose, process, product, and performance aspects of diverse systems are considered.

Wood, Richard Thomas [ORNL

2010-01-01T23:59:59.000Z

407

Liquefied Gaseous Fuels Safety and Environmental Control Assessment Program: second status report  

DOE Green Energy (OSTI)

The Assistant Secretary for Environment has responsibility for identifying, characterizing, and ameliorating the environmental, health, and safety issues and public concerns associated with commercial operation of specific energy systems. The need for developing a safety and environmental control assessment for liquefied gaseous fuels was identified by the Environmental and Safety Engineering Division as a result of discussions with various governmental, industry, and academic persons having expertise with respect to the particular materials involved: liquefied natural gas, liquefied petroleum gas, hydrogen, and anhydrous ammonia. This document is arranged in three volumes and reports on progress in the Liquefied Gaseous Fuels (LGF) Safety and Environmental Control Assessment Program made in Fiscal Year (FY)-1979 and early FY-1980. Volume 1 (Executive Summary) describes the background, purpose and organization of the LGF Program and contains summaries of the 25 reports presented in Volumes 2 and 3. Annotated bibliographies on Liquefied Natural Gas (LNG) Safety and Environmental Control Research and on Fire Safety and Hazards of Liquefied Petroleum Gas (LPG) are included in Volume 1.

Not Available

1980-10-01T23:59:59.000Z

408

Automated size-specific CT dose monitoring program: Assessing variability in CT dose  

SciTech Connect

Purpose: The potential health risks associated with low levels of ionizing radiation have created a movement in the radiology community to optimize computed tomography (CT) imaging protocols to use the lowest radiation dose possible without compromising the diagnostic usefulness of the images. Despite efforts to use appropriate and consistent radiation doses, studies suggest that a great deal of variability in radiation dose exists both within and between institutions for CT imaging. In this context, the authors have developed an automated size-specific radiation dose monitoring program for CT and used this program to assess variability in size-adjusted effective dose from CT imaging. Methods: The authors radiation dose monitoring program operates on an independent health insurance portability and accountability act compliant dosimetry server. Digital imaging and communication in medicine routing software is used to isolate dose report screen captures and scout images for all incoming CT studies. Effective dose conversion factors (k-factors) are determined based on the protocol and optical character recognition is used to extract the CT dose index and dose-length product. The patient's thickness is obtained by applying an adaptive thresholding algorithm to the scout images and is used to calculate the size-adjusted effective dose (ED{sub adj}). The radiation dose monitoring program was used to collect data on 6351 CT studies from three scanner models (GE Lightspeed Pro 16, GE Lightspeed VCT, and GE Definition CT750 HD) and two institutions over a one-month period and to analyze the variability in ED{sub adj} between scanner models and across institutions. Results: No significant difference was found between computer measurements of patient thickness and observer measurements (p= 0.17), and the average difference between the two methods was less than 4%. Applying the size correction resulted in ED{sub adj} that differed by up to 44% from effective dose estimates that were not adjusted by patient size. Additionally, considerable differences were noted in ED{sub adj} distributions between scanners, with scanners employing iterative reconstruction exhibiting significantly lower ED{sub adj} (range: 9%-64%). Finally, a significant difference (up to 59%) in ED{sub adj} distributions was observed between institutions, indicating the potential for dose reduction. Conclusions: The authors developed a robust automated size-specific radiation dose monitoring program for CT. Using this program, significant differences in ED{sub adj} were observed between scanner models and across institutions. This new dose monitoring program offers a unique tool for improving quality assurance and standardization both within and across institutions.

Christianson, Olav; Li Xiang; Frush, Donald; Samei, Ehsan [Clinical Imaging Physics Group, Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 and Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 (United States); Clinical Imaging Physics Group, Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 (United States); Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 (United States) and Carl E. Ravin Advanced Imaging Laboratories, Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 (United States); Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 (United States); Clinical Imaging Physics Group, Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 (United States); Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 (United States); Carl E. Ravin Advanced Imaging Laboratories, Department of Radiology, Duke University Medical Center, Durham, North Carolina 27705 (United States); Medical Physics Graduate Program, Duke University, Durham, North Carolina 27705 (United States); Department of Physics, Duke University, Durham, North Carolina 27710 (United States); and Department of Biomedical Engineering, Duke University, Durham, North Carolina 27708 (United States)

2012-11-15T23:59:59.000Z

409

Assessment of the DOE/NREL Historically Black College and University Photovoltaic Research Associates Program  

DOE Green Energy (OSTI)

This report details the DOE/NREL Historically Black College and University (HBCU) Photovoltaic Research Associates Program, a small but remarkable program that directly affected dozens of minority undergraduate students in ways that changed many of their lives. The progress and accomplishments of undergraduates within the nine participating universities were monitored and assessed through their presentations at an annual NREL-sponsored HBCU conference. Although the funding was small, typically $400,000 per year, the money made a significant impact. The best students sometimes went on to the nation's top graduate schools (e.g., MIT) or important management positions in large companies. Other students had opportunities to learn how renewable energy could positively affect their lives and their neighbors' lives. A few were lucky enough to install photovoltaic lighting and water-pumping systems in Africa, and to see and feel firsthand the technical and emotional benefits of this technology for families and villages. Two of the schools, Texas Southern University and Central State University, were particularly successful in leveraging their DOE/NREL funding to obtain additional funding for expanded programs.

Posey-Eddy, F.; McConnell, R. D.

2002-08-01T23:59:59.000Z

410

Annual Coded Wire Tag Program; Oregon Stock Assessment, Annual Report 2002.  

DOE Green Energy (OSTI)

This annual report is in fulfillment of contract obligations with Bonneville Power Administration which is the funding source for the Oregon Department of Fish and Wildlife project 'Annual Stock Assessment - Coded Wire Tag Program (ODFW)'. Results for the 2002 contract period: Objective 1 - Over 1 million juvenile salmon were coded-wire by this program (Table 1). This accounted for about 20% of the fish ODFW coded-wire tagged in 2002 for release in the Columbia Basin; Objective 2 - ODFW recovered and processed over 50,000 snouts collected from coded-wire tagged fish (Table 2); Objective 3 - The survival data summarized below includes results for coded-wire groups funded by this program as well as coded-wire groups funded from other sources; Objective 4 - The last returns of experimental groups of coho marked with VIE tags occurred in 2002 at Sandy Hatchery. This sampling showed that 26 of 67 jack coho and 1 of 2,223 adult coho VIE marked as juveniles retained the VIE mark as adults.

Lewis, Mark; Mallette, Christine; Murray, William

2003-03-01T23:59:59.000Z

411

Program Plan for Revision of the Z-Area Saltstone Disposal Facility Performance Assessment  

SciTech Connect

Savannah River National Laboratory (SRNL) and the Saltstone Project, are embarking on the next revision to the Saltstone Disposal Facility (SDF) performance assessment (PA). This program plan has been prepared to outline the general approach, scope, schedule and resources for the PA revision. The plan briefly describes the task elements of the PA process. It discusses critical PA considerations in the development of conceptual models and interpretation of results. Applicable quality assurance (QA) requirements are identified and the methods for implementing QA for both software and documentation are described. The plan identifies project resources supporting the core team and providing project oversight. Program issues and risks are identified as well as mitigation of those risks. Finally, a preliminary program schedule has been developed and key deliverables identified. A number of significant changes have been implemented since the last PA revision resulting in a new design for future SDF disposal units. This revision will encompass the existing and planned disposal units, PA critical radionuclides and exposure pathways important to SDF performance. An integrated analysis of the overall facility layout, including all disposal units, will be performed to assess the impact of plume overlap on PA results. Finally, a rigorous treatment of uncertainty will be undertaken using probabilistic simulations. This analysis will be reviewed and approved by DOE-SR, DOE-HQ and potentially the Nuclear Regulatory Commission (NRC). This revision will be completed and ready for the start of the DOE review at the end of December 2006. This work supports a Saltstone Vault 2 fee-bearing milestone. This milestone includes completion of the Vault 2 module of the PA revision by the end of FY06.

Cook, James R.

2005-12-07T23:59:59.000Z

412

Literature Review for the Baseline Knowledge Assessment of the Hydrogen, Fuel Cells, and Infrastructure Technologies Program  

DOE Green Energy (OSTI)

The purpose of the Hydrogen, Fuel Cells, and Infrastructure Technologies (HFCIT) Program Baseline Knowledge Assessment is to measure the current level of awareness and understanding of hydrogen and fuel cell technologies and the hydrogen economy. This information will be an asset to the HFCIT program in formulating an overall education plan. It will also provide a baseline for comparison with future knowledge and opinion surveys. To assess the current understanding and establish the baseline, the HFCIT program plans to conduct scientific surveys of four target audience groups--the general public, the educational community, governmental agencies, and potential large users. The purpose of the literature review is to examine the literature and summarize the results of surveys that have been conducted in the recent past concerning the existing knowledge and attitudes toward hydrogen. This literature review covers both scientific and, to a lesser extent, non-scientific polls. Seven primary data sources were reviewed, two of which were studies based in Europe. Studies involved both closed-end and open-end questions; surveys varied in length from three questions to multi-page interviews. Populations involved in the studies were primarily adults, although one study involved students. The number of participants ranged from 13 to over 16,000 per study. In addition to the primary surveys, additional related studies were mined for pertinent information. The primary conclusions of the surveys reviewed are that the public knows very little about hydrogen and fuel cell technologies but is generally accepting of the potential for hydrogen use. In general, respondents consider themselves as environmentally conscious. The public considers safety as the primary issue surrounding hydrogen as a fuel. Price, performance, and convenience are also considerations that will have major impacts on purchase decisions.

Truett, L.F.

2003-12-10T23:59:59.000Z

413

Annual Stock Assessment - CWT [Coded Wire Tag program] (USFWS), Annual Report 2007.  

DOE Green Energy (OSTI)

In 1989 the Bonneville Power Administration (BPA) began funding the evaluation of production groups of juvenile anadromous fish not being coded-wire tagged for other programs. These groups were the 'Missing Production Groups'. Production fish released by the U.S. Fish and Wildlife Service (FWS) without representative coded-wire tags during the 1980s are indicated as blank spaces on the survival graphs in this report. This program is now referred to as 'Annual Stock Assessment - CWT'. The objectives of the 'Annual Stock Assessment' program are to: (1) estimate the total survival of each production group, (2) estimate the contribution of each production group to fisheries, and (3) prepare an annual report for USFWS hatcheries in the Columbia River basin. Coded-wire tag recovery information will be used to evaluate the relative success of individual brood stocks. This information can also be used by salmon harvest managers to develop plans to allow the harvest of excess hatchery fish while protecting threatened, endangered, or other stocks of concern. All fish release information, including marked/unmarked ratios, is reported to the Pacific States Marine Fisheries Commission (PSMFC). Fish recovered in the various fisheries or at the hatcheries are sampled to recover coded-wire tags. This recovery information is also reported to PSMFC. This report has been prepared annually starting with the report labeled 'Annual Report 1994'. Although the current report has the title 'Annual Report 2007', it was written in fall of 2008 using data available from RMIS that same year, and submitted as final in January 2009. The main objective of the report is to evaluate survival of groups which have been tagged under this ongoing project.

Pastor, Stephen M. [U.S. Fish and Wildlife Service, Columbia River Fisheries Program Office

2009-07-21T23:59:59.000Z

414

Nuclear proliferation and civilian nuclear power. Report of the Nonproliferation Alternative Systems Assessment Program. Volume IV. Commercial potential  

Science Conference Proceedings (OSTI)

This volume of the Nonproliferation Alternative Systems Assessment Program (NASAP) report provides time and cost estimates for positioning new nuclear power systems for commercial deployment. The assessment also estimates the rates at which the new systems might penetrate the domestic market, assuming the continuing viability of the massive light-water reactor network that now exists worldwide. This assessment does not recommend specific, detailed program plans and budgets for individual systems; however, it is clear from this analysis that any of the systems investigated could be deployed if dictated by national interest.

Not Available

1980-06-01T23:59:59.000Z

415

Impact assessment of draft DOE Order 5820.2B. Radioactive Waste Technical Support Program  

SciTech Connect

The Department of Energy (DOE) has prepared a revision to DOE Order 5820.2A, entitled ``Radioactive Waste Management.`` DOE issued DOE Order 5820.2A in September 1988 and, as the title implies, it covered only radioactive waste forms. The proposed draft order, entitled ``Waste Management,`` addresses the management of both radioactive and nonradioactive waste forms. It also includes spent nuclear fuel, which DOE does not consider a waste. Waste forms covered include hazardous waste, high-level waste, transuranic (TRU) waste, low-level radioactive waste, uranium and thorium mill tailings, mixed waste, and sanitary waste. The Radioactive Waste Technical Support Program (TSP) of Leached Idaho Technologies Company (LITCO) is facilitating the revision of this order. The EM Regulatory Compliance Division (EM-331) has requested that TSP estimate the impacts and costs of compliance with the revised order. TSP requested Dames & Moore to aid in this assessment by comparing requirements in Draft Order 5820.2B to ones in DOE Order 5820.2A and other DOE orders and Federal regulations. The assessment started with a draft version of 5820.2B dated January 14, 1994. DOE has released three updated versions of the draft order since then (dated May 20, 1994; August 26, 1994; and January 23, 1995). Each time DOE revised the order, Dames and Moore updated the assessment work to reflect the text changes. This report reflects the January 23, 1995 version of the draft order.

NONE

1995-04-01T23:59:59.000Z

416

T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

417

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple...

418

An Assessment of ORNL PIE Capabilities for the AGR Program Capsule Post Irradiation Examination  

Science Conference Proceedings (OSTI)

ORNL has facilities and experienced staff that can execute +the Advanced Gas Reactor (AGR) Post Irradiation Examination (PIE) task. While the specific PIE breakdown needs to be more formally defined, the basic outline is clear and the existing capabilities can be assessed within the needs of the tasks defined in the program plan. A one-to-one correspondence between the program plan tasks and the current ORNL PIE status was conducted and while some shortcomings were identified, the general capability is available. Specific upgrade needs were identified and reviewed. A path forward was formulated. Building 3525 is available for this work and this building is currently receiving renewed attention from management so that it will be in good working order prior to the expected PIE start date. This building is equipped with the tools necessary for PIEs of this nature, but the long hiatus in coated particle fuel work has left it with aging analysis tools. This report identified several of these tools and rough estimates of what would be required to update and replace them. In addition, other ORNL buildings are available to support Building 3525 in specialized tasks along with the normal laboratory infrastructure. Before the AGR management embarks on any equipment development effort, the PIE tasks should be updated against current program (modeling and data) needs and better defined so that the items to be measured, their measurement uncertainties, and thru-put needs can be reviewed. A Data Task Matrix (DTM) should be prepared so that the program data needs can be compared against the identified PIE tasks and what is practical in the hot cell environment to make sure nothing is overlooked. Finally, thought should be given to the development of standardized equipment designs between sites to avoid redundant design efforts and different measurement techniques. This is a potentially cost saving effort that can also avoid data inconsistencies.

Morris, Robert Noel [ORNL

2006-09-01T23:59:59.000Z

419

New York City's Vulnerability to Coastal Flooding  

Science Conference Proceedings (OSTI)

New York City, New York (NYC), is extremely vulnerable to coastal flooding; thus, verification and improvements in storm surge models are needed in order to protect both life and property. This paper highlights the Stony Brook Storm Surge (SBSS) ...

Brian A. Colle; Frank Buonaiuto; Malcolm J. Bowman; Robert E. Wilson; Roger Flood; Robert Hunter; Alexander Mintz; Douglas Hill

2008-06-01T23:59:59.000Z

420

V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: ownCloud Cross-Site Scripting and File Upload 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the filename to apps/files_versions/js/versions.js and apps/files/js/filelist.js and event title to 3rdparty/fullcalendar/js/fullcalendar.js is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Note: This page contains sample records for the topic "vulnerability assessment programs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

U-151: Bugzilla Cross-Site Request Forgery Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51: Bugzilla Cross-Site Request Forgery Vulnerability 51: Bugzilla Cross-Site Request Forgery Vulnerability U-151: Bugzilla Cross-Site Request Forgery Vulnerability April 19, 2012 - 8:15am Addthis PROBLEM: A vulnerability has been reported in Bugzilla, which can be exploited by malicious people to conduct cross-site request forgery attacks. PLATFORM: Bugzilla 2.x Bugzilla 3.x Bugzilla 4.x ABSTRACT: The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. reference LINKS: Vendor Advisory Secunia Advisory 48835 CVE-2012-0465 CVE-2012-0466 IMPACT ASSESSMENT: Medium Discussion: When abusing the X-FORWARDED-FOR header, an attacker could bypass the lockout policy allowing a possible brute-force discovery of a valid user password. An attacker can get access to some bug information using the victim's

422

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: MySQL User Login Security Bypass and Unspecified 8: MySQL User Login Security Bypass and Unspecified Vulnerability U-188: MySQL User Login Security Bypass and Unspecified Vulnerability June 12, 2012 - 7:00am Addthis PROBLEM: A security issue and vulnerability have been reported in MySQL PLATFORM: MySQL 5.x ABSTRACT: An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. Reference LINKS: Original Advisory CVE-2012-2122 Secunia Advisory 49409 IMPACT ASSESSMENT: High Discussion: Successful exploitation of this vulnerability requires MySQL to be built on a system with a library that allows "memcmp()" to return a value outside of the -128 through 127 range (e.g. sse-optimized glibc). NOTE: Vendor binaries are reportedly not affected. The security issue is reported in versions prior to 5.1.63 and 5.5.25.

423

U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing 7: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability August 16, 2012 - 7:00am Addthis PROBLEM: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability PLATFORM: Version(s): Mozilla Firefox 6 - 12 ABSTRACT: To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. REFERENCE LINKS: http://www.securityfocus.com/bid/54585 CVE-2012-1950 IMPACT ASSESSMENT: Medium Discussion: The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load. mozilla Firefox is prone to a URI-spoofing spoofing vulnerability. Attackers may exploit this issue to display

424

U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

37: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing 37: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability August 16, 2012 - 7:00am Addthis PROBLEM: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability PLATFORM: Version(s): Mozilla Firefox 6 - 12 ABSTRACT: To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. REFERENCE LINKS: http://www.securityfocus.com/bid/54585 CVE-2012-1950 IMPACT ASSESSMENT: Medium Discussion: The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load. mozilla Firefox is prone to a URI-spoofing spoofing vulnerability. Attackers may exploit this issue to display

425

U-117: Potential security vulnerability has been identified with certain HP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Potential security vulnerability has been identified with 7: Potential security vulnerability has been identified with certain HP printers and HP digital senders U-117: Potential security vulnerability has been identified with certain HP printers and HP digital senders March 5, 2012 - 7:00am Addthis PROBLEM: The vulnerability could be exploited remotely to install unauthorized printer firmware. PLATFORM: Select HP printers and Digital Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. reference LINKS: Vendor Advisory CVE-2011-4161 Previous JC3 Advisory Bulletin IMPACT ASSESSMENT: High Discussion: The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, 4xxx, 5550, 9500, CMxxxx, CPxxxx, and Enterprise CPxxxx;

426

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

427

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

428

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

429

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

430

DOE-STD-1158-2002; Self-Assessment Standard for DOE Contractor Criticality Safety Programs  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02 02 November 2002 DOE STANDARD SELF-ASSESSMENT STANDARD FOR DOE CONTRACTOR CRITICALITY SAFETY PROGRAMS U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. DOE-STD-1158-2202 iii FOREWARD 1. This Department of Energy standard is approved for use by all DOE Components and their

431

Tucannon River Spring Chinook Captive Broodstock Program Final Environmental Assessment and Finding of No Significant Impact  

SciTech Connect

Bonneville Power Administration (BPA) is proposing to fund the Tucannon River Spring Chinook Captive Broodstock Program, a small-scale production initiative designed to increase numbers of a weak but potentially recoverable population of spring chinook salmon in the Tucannon River in the State of Washington. BPA has prepared an Environmental Assessment (EA) (DOE/EA-l326) evaluating the proposed project. Based on the analysis in the EA, BPA has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an Environmental Impact Statement (EIS) is not required, and BPA is issuing this Finding of No Significant Impact (FONSI).

N /A

2000-05-24T23:59:59.000Z

432

WEATHERIZING THE HOMES OF LOW-INCOME HOME ENERGY ASSISTANCE PROGRAM CLIENTS: A PROGRAMMATIC ASSESSMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

CON-486 CON-486 WEATHERIZING THE HOMES OF LOW-INCOME HOME ENERGY ASSISTANCE PROGRAM CLIENTS: A PROGRAMMATIC ASSESSMENT Bruce Tonn Richard Schmoyer Sarah Wagner OAK RIDGE NATIONAL LABORATORY DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge. Web site http://www.osti.gov/bridge Reports produced before January 1, 1996, may be purchased by members of the public from the following source. National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone 703-605-6000 (1-800-553-6847) TDD 703-487-4639 Fax 703-605-6900 E-mail info@ntis.fedworld.gov Web site http://www.ntis.gov/support/ordernowabout.htm Reports are available to DOE employees, DOE contractors, Energy Technology Data Exchange (ETDE) representatives,

433

CERTS 2012 Program Review - Measurement-Based Stability Assessment - Dan Trudnowski, U Montana  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Stability Stability Assessment DOE/CERTS Transmission Reliability R&D Internal Program Review Meeting June 12-13, 2012 Washington DC Presenter: Dan Trudnowski, Montana Tech Participants: Dan Trudnowski John Pierre, U of Wyoming Ning Zhou, PNNL Louis Scharf, Consultant 2 Project Objective and Application * Objective: Develop, test, and refine algorithms to automatically estimate oscillations from PMUs in real time. - estimate modal frequency, damping, and shape - estimate mode-estimation performance and validation indices (e.g., error bounds) - detect forced oscillations and identify the cause(s) of such oscillations - collaborate with power-industry partners to test potential algorithms - assist in the WECC system tests * Application - Real-Time Situational Awareness based upon actual system

434

Weatherizing the Homes of Low-Income Home Energy Assistance Program Clients: A Programmatic Assessment  

SciTech Connect

The purpose of this project was to assess the relationships between two federal programs that support low income households, the Weatherization Assistance Program (WAP) and the Low Income Home Energy Assistance Program (LIHEAP). The specific question addressed by this research is: what impact does weatherizing homes of LIHEAP recipients have on the level of need for LIHEAP assistance? The a priori expectation is that the level of need will decrease. If this is the case, then it can be argued that a non-energy benefit of WAP is the reduction in the level of need for LIHEAP assistance for households receiving weatherization assistance. The study area for this project was Boston, Massachusetts, which is representative of large northern urban areas. Additionally, Boston was chosen because one of its social service agencies, Action for Boston Community Development (ABCD), administers both WAP and LIHEAP programs. ABCD has a substantial client base of low-income households and was willing to cooperate in this study. In the State of Massachusetts, an income test is used to determine whether low-income households qualify for standard LIHEAP benefits. Benefits provided to eligible households are determined by a schedule that gauges benefit levels based on household income and number of members in the household. Additionally, households that consume large amounts of primary heating fuel can also qualify an additional high energy subsidy. It was expected that weatherization's biggest influence on the LIHEAP program would be in reducing the number of households qualifying for high energy subsidies. Data were collected for three groups of households that received both weatherization and LIHEAP assistance and for one control group that only received LIHEAP assistance. Table ES-1 indicates the sample sizes, weatherization dates, and winter time periods when changes in energy consumption and receipt of LIHEAP benefits could be expected to be observed. The reason why there is a lag of one year when weatherization impacts upon LIHEAP benefits might be observed is that LIHEAP benefits--specifically high energy benefits--are based on the previous year's primary heat fuel bills.

Tonn, B.

2002-09-16T23:59:59.000Z

435

Use of hazard assessments to achieve risk reduction in the USDOE Stockpile Stewardship (SS-21) Program  

Science Conference Proceedings (OSTI)

This paper summarizes the nuclear explosive hazard assessment activities performed to support US Department of Energy (DOE) Stockpile Stewardship Demonstration Project SS-21, better known as the ``Seamless Safety`` program. Past practice within the DOE Complex has dictated the use of a significant number of post-design/fabrication safety reviews to analyze the safety associated with operations on nuclear explosives and to answer safety questions. These practices have focused on reviewing-in or auditing-in safety vs incorporating safety in the design process. SS-21 was proposed by the DOE as an avenue to develop a program to ``integrate established, recognized, verifiable safety criteria into the process at the design stage rather than continuing the reliance on reviews, evaluations and audits.`` The entire Seamless Safety design and development process is verified by a concurrent hazard assessment (HA). The primary purpose of the SS-21 Demonstration Project HA was to demonstrate the feasibility of performing concurrent HAs as part of an engineering design and development effort and then to evaluate the use of the HA to provide an indication in the risk reduction or gain in safety achieved. To accomplish this objective, HAs were performed on both baseline (i.e., old) and new (i.e. SS-21) B61-0 Center Case Section disassembly processes. These HAs were used to support the identification and documentation of weapon- and process-specific hazards and safety-critical operating steps. Both HAs focused on identifying accidents that had the potential for worker injury, public health effects, facility damage, toxic gas release, and dispersal of radioactive materials. A comparison of the baseline and SS-21 process risks provided a semi-quantitative estimate of the risk reduction gained via the Seamless Safety process.

Fischer, S.R.; Konkel, H.; Bott, T.; Eisenhawer, S.W. [Los Alamos National Lab., NM (United States); DeYoung, L.; Hockert, J. [Odgen Environmental and Energy Services, Albuquerque, NM (United States)

1995-07-01T23:59:59.000Z

436

Independent Oversight Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Independent Oversight Program Independent Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents › Security and Cyber Evaluations › Safety and Emergency Management Evaluations Reports › Physical Security › Cyber Security › Safety and Emergency Management Evaluations Reports › Prior Environment, Safety and Health Evaluations Reports ›Prior Emergency Management Evaluations Reports Contact Us HSS Logo Welcome to the Independent Oversight Program The Independent Oversight Program is implemented by the Office of Health, Safety and Security's (HSS) Office of Enforcement and Oversight. The mission of this program is to provide DOE line management, Congress, and other stakeholders with an independent evaluation of the effectiveness of DOE policy and line management performance in safety and security, and other critical areas as directed by the Secretary of Energy. The Office of Enforcement and Oversight performs this mission by conducting activity, facility, site, and Department-wide performance-based assessments that are designed to verify that the Department's safeguards and security interests are protected, that the Department can effectively respond to emergencies, and that Departmental employees, the public, and the environment are protected from hazardous operations and materials. These assessments complement line management's responsibility for security and safety program oversight and self-assessments. The outcome of these assessments are reports that provide information and analysis regarding the effectiveness, vulnerabilities, and trends in DOE safety and security programs, and identify issues requiring corrective action as well as recommended areas for improvement.

437

End-Use Load and Consumer Assessment Program: Analysis of residential refrigerator/freezer performance  

SciTech Connect

The Bonneville Power Administration (Bonneville) is conducting a large end-use data acquisition program in an effort to understand how energy is utilized in buildings with permanent electric space heating equipment in the Pacific Northwest. The initial portion of effort, known as the End-Use Load and Consumer Assessment Program (ELCAP), was conducted for Bonneville by the Pacific Northwest Laboratory (PNL). The collection of detailed end-use data provided an opportunity to analyze the amount of energy consumed by both refrigerators and separate freezers units located in residential buildings. By obtaining this information, the uncertainty of long- term regional end-use forecasting can be improved and potential utility marketing programs for new appliances with a reduced overall energy demand can be identified. It was found that standby loads derived from hourly averages between 4 a.m. and 5 a.m. reflected the minimum consumption needed to maintain interior refrigerator temperatures at a steady-state condition. Next, an average 24-hour consumption that included cooling loads from door openings and cooling food items was also determined. Later, analyses were conducted to develop a model capable of predicting refrigerator standby loads and 24-hour consumption for comparison with national refrigerator label ratings. Data for 140 residential sites with a refrigeration end-use were screened to develop a sample of 119 residences with pure refrigeration for use in this analysis. To identify those refrigerators that were considered to be pure (having no other devices present on the circuit) in terms of their end-use classification, the screening procedure used a statistical clustering technique that was based on standby loads with 24-hour consumption. 5 refs., 18 figs., 4 tabs.

Ross, B.A.

1991-09-01T23:59:59.000Z

438

DOE/EA-1326: Tucannon River Spring Chinook Captive Broodstock Program Final Environmental Assessment (05/24/00)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TUCANNON RIVER SPRING CHINOOK TUCANNON RIVER SPRING CHINOOK CAPTIVE BROODSTOCK PROGRAM Final Environmental Assessment and Finding of No Significant Impact DOE/EA-1326 B o n n e v i l l e P o w e r A d m i n i s t r a t i o n BONNEVILLE POWER ADMINISTRATION Tucannon River Spring Chinook Captive Broodstock Program Final Environmental Assessment DOE/EA-1326 May 23, 2000 Tucannon River Spring Chinook Captive Broodstock Program PreliminaryFinal Environmental Assessment B o n n e v i l l e P o w e r A d m i n i s t r a t i o n i Table of Contents Page 1. PURPOSE AND NEED FOR ACTION ........................................................................................ 1 1.1 INTRODUCTION ................................................................................................................................ 1 1.2 NEED FOR ACTION ...........................................................................................................................

439

Combustion Engineering Integrated Coal Gasification Combined Cycle Repowering Project, Clean Coal Technology Program. Environmental Assessment  

Science Conference Proceedings (OSTI)

The DOE entered into a cooperative agreement with Combustion Engineering, Inc. (C-E) under which DOE proposes to provide cost-shared funding to design, construct, and operate an Integrated Coal Gasification Combined Cycle (IGCC) project to repower an existing steam turbine generator set at the Springfield (Illinois) City Water, Light and Power (CWL&P) Lakeside Generating Station, while capturing 90% of the coal`s sulfur and producing elemental sulfur as a salable by-product. The proposed demonstration would help determine the technical and economic feasibility of the proposed IGCC technology on a scale that would allow the utility industry to assess its applicability for repowering other coal-burning power plants. This Environmental Assessment (EA) has been prepared by DOE in compliance with the requirements of National Environmental Policy Act (NEPA). The sources of information for this EA include the following: C-E`s technical proposal for the project submitted to DOE in response to the Innovative Clean Coal Technology (ICCT) Program Opportunity Notice (PON); discussions with C-E and CWL&P staff; the volume of environmental information for the project and its supplements provided by C-E; and a site visit to the proposed project site.

Not Available

1992-03-01T23:59:59.000Z