ML20077F150

From kanterella
Jump to navigation Jump to search
ITS News.Spring 1991.Volume 7,Number 2
ML20077F150
Person / Time
Issue date: 03/01/1991
From:
NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM)
To:
References
NUREG-BR-0056, NUREG-BR-0056-V07-N2, NUREG-BR-56, NUREG-BR-56-V7-N2, NUDOCS 9106120209
Download: ML20077F150 (20)


Text

_ _ _ _. - _ _ _ - _ _ _. _ _ -

m e nimummmmmmmme SPRING 1991 sam,t -

same samme m

Vol. 7, No. 2 E

M NUREG/BR 0056 M

emmL M M

M Information Technology U.S. Nuclear M'c' o""'o""at' "

hj;) ) Regulatory

\\

Services Support Center

~ " '

and Training Laboratory

' Comm ssion Mice f Personnel Does Your PC COMPUTER VIRUS !

Need A Shot 7

Against Viruses?

N g

Ib' Dara Gordon, IRAf

(

Y

\\

/ HATE A computer virus is a relatively new

/

kind of threat to the security and SHOTS !

integrity of computer sptems. Like 7

h{,b gjgE yguR pC other threats, a computer virus can 00NH! 00N7

[

cause the loss or alteration of programs or data. /, computer virus O

HAVE TO GET4 SHOT!

-,s is usually introduced by an infected file hand carried in or down loaded N

GU4RO AG4/NST to the computer. From there it can k

COMPUTER VIRUSES!

@k,%

spread from one computer to another via diskette, modem or d

through k> cal area networks (LAN).

[

[k j

J A computer virus can spread from u

~ gp

=%, g ccmputer program to computer

?_

g1 program, and from system to system, 1

without direct human intervention.

~

r See NRC's Announcement No. I1, E

. A'

.x.

x dated February 4,1991, local Area s

Network Virus infection, for more informatic, concerning a recent Virus Attack in problem w anin our agencv.

THE ISSUE AT HAND Research The essential component of a virus by Ralph Landry, RES is a set of instructions w hich, when timergency Response Data Sysicm.. 4 CD-ROM Nim Available at NRC executed, spreads itself to other On Wednesday afternoon, January 1.ibrary.._

a previously unaIIected programs or 2A strange things began to happen Al I her Group Meeting iIcu..

.8 files. A typical computer virus on the Research (RES) h> cal area w,3p i,,,p,,,cn,cg,.

,, 9 performs two functions. First,it network (LAN). Displays started copies itself into uninfected pro-scrolling and acting funny. Printing

(,#"$ rn ],t oNM h

c, grams or files. Second, the virus seemed to take forever, Finally, the 9

Sign On With S'NIiT..

.12 executes whateser other instructions system just stopped with the intor-its autho. has given it. Depending rnative message that the SRES-01 Reducing NIH Timeshanng Gwts _.13 on the motises of the virus author, server was unable to communicate.

NUDOCS Nem..

.. M these instructions can do anything, Users had already concluded that in layman's language

.15 including displaying a message, there was a communicatior. prob-Risky Busmeu..

. 15 erasing files, or altering stored data.

Iem! The situation had not changed ns Trainmg tab Nen..

. 16 in some cases, a virus may cause on Thursday morning, so many of it's Time m change Your computer damage by duplicating itself and the secretaries resorted to using password!...

_ 17 taking up scarce resources, such as their PCs as stand.alone computers ns Tech Note -

.18 disk space, CPU time, or network with their attached printers. That connectio".s.

was fine for those w ho had printers NOlli: Clip and Save the ther Directory on the last page. This n a (Continued on page 2, ' Shot *)

(Continued on page 3, *AttacL *)

(n*g"'&'n',"Q ',h*l[j'l[h _

7 9106120209 910301 PDR NUREG BR-0056 R PDR

(from

  • Shot *, page 1) program to which it has access. As a e lf you ser any problems after the result, the virus may spread through-disk has been checked, report the Computer viruses are now a main out the organization in a short time.

problems right away. Call the concern with LANs. For example, ITS Support Center,492-4160 or suppose an organization hires a Some viruses discovered to date 492-0353.

computer programmer to perform have been relatively benign, or have tasks that involve working on one of spread rather slowly. In some cases, if your computer is used in a the organization's personal comput-however, many machines and networked environment, take ers (PC) that is connected to a LAN. networks can bemme infected with special care since the file sharing The programmer unknowingly may the virus remaining undetected facilitks of a network (i.e., file bring in a few programs to aid in the until a predetermined date or action servets) can greatly accelerate the work, such as a copied text editor triggers it. Sometimes the person spread of viruses. NISTN suggested infected with a virus. Using that creating a virus is a disgruntled security practices for LANs include:

editor on one of the organization's individual who intends the damage (1) Suitable security, including user LAN PCN causes the virus to spread to be large or perhaps it is an authenticationahould be enforced from the text editor to one of the experiment to see just how much on network servers. (2) Public soft-programs stored on the organira-damage can be done.

ware repositories and other shared tion's file server. The virus has now directories on network servers entered the organization.

Government agencies such as the should be set up as read only with National Institute oi Standards and only trusted administrators allowed Every time the user accesses a Technology (NIST) have researched to write to these directories..(3) program with the infected text methods to protect equipment Avoid using server-resident software editor, the virus is spread through.

against potential threats, such 'as from directories that are not write-out the LAN. The virus then computer viruses. Organizations protected. (4) Software stored on spreads to more users and more should evaluate their vulnerabilities network servers should be scanned machines. Each copy of the virus and take actions to limit their risks frequently. (5) Nevu copy" free-can duphcate itself, and infect any against computer viruses. There are ware, shareware," or other softwarc no known ways to make a general and don't let others use the copied computing system completely software. Reference the guidelines F-immune from viral attacks. Ilow-stated irl NRC Bulletin 0@-4.

ever, NIST has published a list of ITS NEWS CREDITS precautionary steps to follow to There are several programs available protect equipment. The steps are to check (scan) computer systems

'the rl$ NEWS is a quarterty pubhcation published in the NIST pamphlet and diskettes for computer viruses.

pnedmg inrormation or interest to usen entitled," Computer Viruses: A Self-If you are interested in using them, or computer technology at the NRC. It is Protection Checklist." (Available on please contact the Coues and produced by the starr or the NRC Infor.

request).

Standards Section,492-5019.

mation Technology Services Support Center and Traming laboratory in Some of the steps mentioned arc:

If you have any question about this ctmjunction mth the NRC's O rice or

  • Never start up (boot) your 492 9974.

We wricomc questions. comments, and computer from a diskette unless articles. Please contact the 113 star! by-you use the original, write-protected system master, or a Phone:49N009 trusted copy.

Man or in Penon: MNHB M2 FORTRAN 90 Standard

. Never add data or programs to a lana Cobb,IRhtTI3n system master diskette.

Faceutive I% tor

'The International Standardi-e Do not insert your system master zation Organization (ISO) oraduate School.USDA Pubhcation Coordmation diskette into another computer recently voted to accept the unless the diskette is write.

proposed FORTRAN 90 as an Design Consuuation, tuusirations, and protected.

international standard. The Concepts by NRC Automated Graphics American group, ANSI X3J3, Section

. Be careful w hen acquiring new met in April to vote on accep-software. Ask yourself these tance. Persons interested in Contributon to regular items are:

questions: Did it come from a obtaining information on the K. Heckman,1,. Clayman, C. Memu, F~

reliable source? Has Ihe software new standard may contact Robinson, P. Smith, and 1. tancaster.

been checked for viruses?

Emily Robinson on 492-3490.

l rt3 NEWS Page 2 i

(pom *AttacA", pay /)

the virus that could reinfect the recent weeks. All describe the virus network server. We also worked out threat as akin to waiting for the attached, but not for those who had plans to start checking escryone's other shoc to fall. The question is to share a printer via the I AN.

diskettes before they were used on w hen will it happen, rather than will any PCs, whether networked or not.

it happen. That was the state of our The local computer experts started Af'ter all, an infected disk coulJ system before the virus hit. 'Ihat is their search for the problem behind easily undo all of our hard work.

the state of any splem not protected the more mysterious than usual Over the weekend, a memo from Al from a virus attack. Even though operation of the LAN. Several Burda was prepared to inform the the NRC has a management direc-people working in parallel came to RES staff of the events and the tive prohibiting the use of unap-the conclusion that the Research procedures to be followed before pnwed software, a virus can and will i

l LAN had bcen struck by a computer disks were used, find its' way into the system if there virus. What's a computer virus? See is no protection. Someone will Dara Gordon's accompanying article ta> king back over the experien e, bring it in a program from a relatise, in this issue of ITS News it's easy to see w here things were friend, or contractor w ho couldn't donc right and w here in,provenient possibly have an infected program, One of the researchers, using a virus is needed. A definite asset is hasing or software will be downloaJed from detection program, found a PC a number of people who are skilled an electronic bulletin board, a infected with the Jerusalem B virus, notorious source of viruses. One At the same time, sescral staff defense is to install anti viral members working with an IRM sof tware. The software is so (heap l

contractor found that the network and effective as to make it easy to be menu file would increase in si/c by protected. The lost RES staff time i

about 1,NO bytes every time it was Just because we are a and productivity caused by the virus executed, until the file server would government agency, it that attacked the RES LAN was l

hang up. These are typical symp-does not mean we are sienificant. The cost of protecting toms of the Jerusalem virus straint secure from a Computt.,

e :ry PC and network in the NRC Other actions the Jerusalem virus virus attack, would be much more reasonable.

can take include making a black bm The other defense is not to bring in appear on the screen,15 spa <;es by 2 and use unauthori/cd sof tware.

hnes, slowing the sptem to 10 percent of its nor mal speed, and What have we learned from this resetting file si/cs to O bytes.

experience in RES? For one thing.

Jerusalem is the most common virus with personalcomputers. The more just because we are a government strain at this time. Although it is help with a problem, the better.

agency,it does not mean we are not always destructise,it is a signifb llowever, after talking with friends secure from a computer virus attack.

I cant irritation. On Thursday at NationalInstitute of Standards Escryone needs to adhere to the l

esening, we decided to notify IRM and Technology (NIST) and with agency guidelines for software use and start Iresh Friday morning.

one of the leading researchers in (see NRC Bulletin Ow4), and we computer viruses, a mistake was should have anti-viral protection on Friday became increasingly hectic as made in not making copics of the major agency sptems. Finally,if a we started to cleanse the sptem.

virus as evidence of w hat was found viral attack occurs, the system must With the assistance of Lou on various computers. Many viruses be cleaned in a structured manner by Gro> man, the OANDB LAN make small changes as they multiply knowledgeable staff so that vital Administration Team, and other and attach to new files. Examina-evidence is not destroyed in the IRM computer security staff, by the lion of the virus, as found through-process. Under no circumstance end of the day we had managed to out the system, might hase helped should inexperienced personnel deal check all the PCs in the Nicholson determine the point of introduction.

with computer virus infections.

1;me North and South buildings.

While there may be no doubt the IRM should be called immediately The IRM contractor had reinstalled virus was intnxluced by accident, it so that personnel with proper the network operating sptem and a would be helpful to know w here the detection and disinfection software clean back-up tape of sof tware and weak link occurred. As a result, we can resp (md to handle the problem.

files. Escrything h>oked ready to go.

are now developing procedures to be Since it was late in the day, we followed if another sirus is discov-IRM NOTI': Since this occurrence, decided to wait until Monday cred in RES.

IRM has ordered an integrated virus morning to bring the LAN back into detection and removal software operation.

Several journals and newspapers, package from McAfee Associates for such as PC Wcek, WordPericci.

installation on the RES LAN. This That decision gave us time to make Tile M AG AZINE, ano The package will be expanded te coser one more sweep of all the PCs to Washington Post, have printed all NRC LAN's in the coming ensure none were still infected with arueles about computer viruses m months.

Ils NNs Pap 3

The Emergency Parameters monitored by the Response Data emergency aesponse cata system System Irv John Jolicoeur, AEOD Plant Sptem PWR BWR If an accident occurs at a nuclear Reactor Reactor coolant pressure Reactor emlant pressure power plant, the Nuclear Regulatory Coolant Temperature - hot leg Reactor vesselievel Commission's (NRC) functions System Temperature - cold leg Feedwater now include monitoring the performance Temperature. core exit Reactor power of the utility concerned and provid-thermocouples ing support services while the Subcooling margin operators implement emergency Pressuri/cr lesel operating procedures These RCS charn,ing m-Leup flow support services may include Reactor vessellevel Of available) assisting with technical analysis and Reactor coolant now logistics, confirming the licensce's Reactor power recommendations to off-site authorities, and keeping other Secondary Steam generator levels Federal agencies and the media sup-Coolant Steam generator pressures plied with information on the System Main feedwater Don incident. In this situation, the NRC Auxiliary /cmergency feedwater flows becomes a data collection center and maintains intelligible, useful Safety liigh pressure safety RCIC 00w information.

Injection injection flows System Imw pressure safety HPC1/IIPCS Dow To accomplish this task, the NRC injection flows requires four types of accurate, Safety injection Dows (W)

Core spray flow timely data:

Borateo w ater storage LPCInow tank level Condensate storage

-Core and coolant system data tank level

-Containment data Containment Containment pressure Drywell pressure

-Radioactivity release data Containment temperature Drywell temperature

-Meteorological conditions at tne liydrogen concentration Hydrogen and oxygen plant site, concentration Containment sump levels Drywell sump levels With this information, the NRC can Supression pool assess core and containment temperature conditions for the possibility of Supression poollevel damage or failure and determine the degree of public danger.

Radiation Reactor coolant Reactor coolant Monitoring radioactivity level radioactivity level Until recently, these data were System Containment radiation level Primary containment verbally communicated between the radiation level plant a'nd NRC personnel. This Condenser air renmval Condenser off gas required an excessive amount of radiation level radiation level time and could have resulted in er-Efnuent radiation monitor Effluent radiation roneous communication ofimpor-levels monitor levels tant data. To solve this problem, an Process radiation monitor Process radiation automa'ed, real time system for data levels monitor levels collection was developed for the NRC. Thh system is the Emergency Meteorological Wind speed Wind speed Response Data System (ERDS),

Sptem Wind direction Wind direction which enables an NRC computer to Atmospheric stability Atmospheric receive data directly frc,m the stability nuclear plant's computer over a telephone line.

El International designed and developed the Emergency Response Table 1.

[15 NiiWS Page 4

Data System to receive. process, to be transmitted by boiling waier retransmitted to all users logged into store, and disseminate information reactor (llWR) and pressuri/cd the sptem. The users have the pathered from any nuclear plant that water reactor (PWR) licensees.

option of viewing the data ofinterest has declared an emergeng at the in a tabular or trending (plot)

Al.ERTlesel at higher at the site.

When a site emergeng is declared at format an a display terminal ERDS is hicated in the NRC Opera-a power plant, the licensee initiates During this period, ERDS is supple.

tions Center at the Maryland Na.

the ERDS data transminion f rom mented with voice transmissions of tional llank lluilding in Ikthesda and the plant's computer sptem As essential data not availible on the has been in operation since July IW data are received by the ERDS licensee's system.

computer, the computer will identify To date,25 licensees comprising 65 the licensee on-line, and collect and State-of the-art computer technol-reactor units base volunteered to sort the data based on plant-specific ogy is used to provide a high degree implement ERDS at indiviJual plant information that is resident within of system reliability. The ERDS i

sites. The licensecs' responsibility ERDS design centers around two identical for ERDS relies on data collected by MicroVax.VJ O minicomputers the plant's computer. Show n in his information is archised onto manufactured by Digital Equipment Table 1 is a list of specific parameters the computer's hard disk and Corporation (as shown in Figure 1).

HARDWARE CONFIGURATION FOR THE NRC's EMERGENCY RESPONSE DATA SYSTEM k

m m

v M.crcV A A

  • FAILOVER LINK MicroVAX
  • i i

I i

PLANTiUSER COMYUNICATION l

9 TRACK CHANNELS 9-TRACK

}

TAPE TAPE l

l LINE COYMUNICATION PRINTER CHANNELS I

SWITCHING

)

j PLAN T SYSTEM COYYUNI ATION y ea MODEM I

?

I i

i NRC

, - l_4] \\ HEADOUARTERS NRC n

REGION AL OFFICE e

COM YU NIC ATION f@MMid ' DISPLAY

}

t INE PERSONAL TERMINALS F

j COMPUTER I

MODEM l

I 7.L_

i em LaJ-t-l sesweA ]

PERSONAL COMPUTER Figure 1.

n s v w s P.,g s t

One computer functions as the RW Nm

' ion 'harses Mo' cover 'ae 8'ca'e' master system while the other the number ofindividuals w ho use operates in a standby mode. Should Available at CD-ROM the lower the unit cost.

I the master sptem experience a I

hardware failure, talloser sof tware nRC Library CD ROM is the astonishing storage u

medium deveioped by hiihesand p

will automatically assign master Kim Batik, IRAf the SONY Corporation in 1983. It status to the standby system, and, all can hold vast amounts of digitali/ed communications devices will be The NRC Library invites you to text, data, images, and sound that switched to the new master com-explore the world of compact dise can be searched with CD-ROM puter. This failover scquence occurs technology and dixover how easy it based software. One CD-ROM disc so rapidly that there is no loss of is to access large databases with just has the storage capacity equivalent data.

a few keystrokes. Traditionally, to 272AU pages of text or 2AU most organizations provide unlim-floppy disks! Although these The user display terminah in the ited access to in-house systems but enormous databases can be rapidly application are personal computers discourage personal access to searched, their read-only format that receive simultaneous, periodic commercial on-line scarching in precludes continuous updates.

uplates from the MicroVax com-order to c(mtrol timesharing costs.

Nonetheless, CD-ROM databases puter as new data become available.

In that type of atmosphere,librari-are updated on a regular basis (e.g.,

Depending on the plant computer ans and selected staff become the quarterly annually), making them capabilities, transmission frequencies expert on-line searchers, providing suitable for backfile searching, range from 15-second to 1-minute ihe most cost effectise search results intervals. With personal computers, from fee-based scientific and each user can define and siew a technical databases. The occasional Advantages of End-User particular data set that is unique to searcher or end user who wants to Searching On CD ROM that individual's responsibility during independently access commercial the emergeng. The system is databases is left unsupported.

capable of communicating with four This arrangement is gradually CD-ROM systems should be viewed plants simultaneously.

changing at the NRC Library due to as timesaving reference tools for

~

recent developments in information information and research. CD.

Accuraq and reliability are quite delivery systems.

ROM can electronically read

=

high because there are no human thousands of pages in split seconds interfaces, and many sptems, such as There are now hundreds of commer. and sophisticated CD-ROM soft-the safety parameter display splem cial databases available on compact ware enhances efficient search (SPDS), incorporate automane data disc read-only memory (CD ROM) strategy development. These validation. Respon,c time is aho providing libraries and information products are designed to be user-scry good as the sptem is immedi-centers a low cost solution to end.

friendly and their fast response ately available and capable of rapid user search services. Since CD.

ensures successful searching. End.

transmission with frequent updating. ROM databases are local, there are users can schedule access to these Data cellection is expected to be no timesharing or te,ccommunica.

databases at their own convenience, complete because the primary objective of the SPDS requirement is I __[ Nm to provide the licensee with a tool for quickly assessing the oserall health E

of the plant. Therefore, soice com-1 N

munications can be directed towards

{h^

q 4

a plant condition and plant response

[

=

.5 g

[p rather than toward indisidual j

g Q

j]4 j

instrument readings.

g 3 j_

~ -

7 t ems J

.4 9i> 7 4 ERDS provides the NRC with timely Wyg ~

4 ' ' ff f.

valuable information to assess a

"'~~~9 kM,/, ' '/.

l

,d-6W

[

4 plant's phpical condition and the b

O/h

/MW potential for radioactive release to the environs. Both the utility and i. ]yF 4

{

/

e 5

V s

g NRC will be working from identical information, minimi/ing communica.

}g i

,j jg g g/j g

,M R l' *O' j g!g; t j<

j

/

non errors.

9 g w:s.

.c s

A

l l i N' ' ' ' 'j; > -

w zw If sou have questions concerning the M

<C -

. Q' L.

't.-

w'

= 4 -

Ernergency Respmse Data Sssie' m, Charlie Gorday, IRM, and Wally Norris, RES, are reviewing ASME

~

please call John Jolicoeur at k-4155. Boller and Pressure Vessel Codes from a disk version of CD-ROM, t 15 NEWS Pye 6

CD-ROM Workstation in

^.^r - u d C ~

1 a d~ #

  • White Flint Reading Room, m'

_P. _...R 6C16 f"' 4" W"id"! & T% d ij & n_> p -

y

}k!

.,c kMd

- [db N.

h[II The portabilia of the CD ROM hh gM NND Mh y, all m the libtary to proviJe remote access to information in a compact a m ~

q g q kg< s 4

M4hffmh ipj}y{jy g~ F

{

format that is iJeal for a self senice g

j worLstalion. The Libtary has T

2I established a CD ROM workstation f, ' 'K' y ]' um.inpggggDFf g

in the White Flint Reading Room, h

M 3

m

  • dO > s 8

4C16. expanJing CD-ROM data.

C f Y%Nb^ @d M D PGLIKUNO7:p, base scarching to NRC stafIlocated I

in or near the Wr'ite Flint building.

9 Q ' tnpud

$(

^

7 The workstation consists of one 2S6

-f s

,, g,m.

J n

microcompulcr nth VG A screen,

  • i+q(f31dj$WPN

}

~

- k Q" ]

j' an internal CD-ROM drive and a 2

'~

m lase printer T'ho databases are on

':.e cornpact docs, ready to be One CD-ROM disk can hold 272,000 pages of text.

inserted into the machine and booted up Tbc" un be searched in a varictV of wap, accordine to document delivery. The Library has CD-ROM Products Avall-l author,' title, daie, kesword or purchased several subscriptions to able in The White Flint subject. Sevcral tinea of available CD-ROM pnducts and is consider-Reading Roorn,4C16 compact discs are hsted below. An ing other titles as well. All sugges-intnductory briefing is of fered for nons for new titles are welcome.

all first time users so that the scope CD-ROM additions will be an-of the veious CD Rv6..oducts nounced in the Library llulletin, ASMI:lloller & Pressure \\,essel can be dcscribed and demonstrated.

which is published bi monthly and t, ode (with Interfiled Addenda),

Fost training is also available to distributed to branch chiefs and Information llandling Senice, solve problems and assist with above, the White Flint Reading Demer, Colorado.

advanced search strategy. Arrange Raim, the Nicholson Lane tiranch 30ur initial session by calling the Library, and the regional olfices.

.Itts is the electronte version of the tcference information number 301-The Library will continue to support ASME Boiler & Pressure Vessel 492-7748, during regular businbs end-user scarch senice with work.

Code by the American Society of hours.

stations, training, and documenta.

Mechanical Engineers. Enhanced tion.

search features: Free-text searching; Boolean queries; view and print Future Plans for Library's I". the future, comptete workstations text, rigures, equations and tables; gnd-User Search Service will allow end users to seamlessl3 set electronic bookmarks in the text combine many distinct electronic to easily return to paragraphs technologies. For example, users already identified; use "llot Link" CD-ROM products have become an could access CD-ROM sptems, to move immediately to references integral part of the of the library local area networks or remote in the text, footnotes and other collection in the same way that access databases to dow nload to disk televant sections of the Code paper copy, microform arid elec-or upload from CD ROM or disk to including images of figures, tables, tronic databases complement each a database management sptem.

equations or standards. CD-ROM other. Librarians also consider CD-They could download search results has the sat e updating cycle as the ROM a time-saver in many unu-to a word pmcessing spicm or papet version,1989 edition.

pected ways. Because library services transmit the results to another user are able to identify high usage items via E-Mail.

I:coWStats I, llopkins Technotw, in their collections, these items 7 - - - - - -

llopkins, Minnesota become the best candidates for high-i Ikst4 rustomer se rw n inrenory solume, low cost CD-ROM prod.

! nt utsitu-oi4o).., ahiribut,a '"

Includes eight economic databases:

ucts. The patron who has previ-

  • " ""ployen in h 4ru. The in-ously searched National Technical renor3 ts antanea to inform sur Consumer I, rice Index, I,roducer emiym>r u e.,a.w,,er%

Price Index, Export-linport Price Information Service (NTIS) DI A-l.na no,. io obtain uine sen kn. ir index, Industrial Production Index LOG OnDisc can supply reference you hee any sunnuons or u,m-Money stock, Selected Interest libnrians with all the relevant nwn's rea. rain, inw 1"""'b information required to hasten P'*"*h*'"""""'

" 4" 2 '" 2 "-

Rates Industry Employment Ifours FIh NIES Page 7

& Earnings by state, area, and Te(hnical Report Database, Defense Technical Information Center capacity utilitation. Menu Search.

Covers 1913 1988, annual updates.

(DTIC), Department of Defense Contains (0),OM) unclassified And Commands 1:lectroMap World Atlas,The technical report bibliographic Softw are Toolworks, Chatsworth, citations accessioned into DTIC's California Defense RDT&E Online System A three page, quick-reference guide, which identifies (DROLS). Specialized subject areas Wordperfect 5.0 Commands Contains 238 Ioll-color maps of are.;srced with Defense such as and Functions, and Codes and every country and most world and aeronautis, mmila icchnology, Meanings of Codes,is avail-regional topographic maps,and,

space technology, navigatitm and able through the ITS Support world statistical maps. Country in-nuclear science. Other top,cs.

Center. To request a copy, i

formation includes 45 topics in five represented are biology, chemistry' pl call 492-4160 or 892-subject areas: Geography, people, energy, environmental science' 0353.

government, economy and commu-oceanography, computer sciences, nications. Enhanced search fea-sociology and human factors engi-tures: country maps may be re*

neuing. Covers 1970 - 1989, trieved by pointing to them on an prototype disc set, index map; statistical maps and text L_

are selected from drop-down menus.

1988 edition, annual updates.

CD ROM Products Avall-able in The Main Library, Elecinmic Encyclopedia, cniller, P190:

Danbury, Connecticut Books in Print Plus, R.R. Ilowker Al User Group All 21 volumes of the Academic Electnmic Publishing, New York, Meetifig Held American Encyclopedia are on one NL disc. Menu Scarch. Enhanced The NRC ArtificialIntelligence search features: Hypertext like links Contains over 750,000 citations User Group (AIUG) met at the to jump between articles and included in the print version of NRC White Flint building on March keyword or phrase searching.1986 Books in Print, Supplement to 12,1991. Recently a survey was con-edition.

Bool;s in Print, and Forthcoming ducted among the AIUG members Books in Print. Over 21,000 pub-to determine their preference for lishers are Ibted. The Library has future activities. Emily Robinson Microsoft llookshelf Microsoft current year and $akd quarter $

presented a statistical summary of Corporation, Redmond, Washing.

the survey. Most of the members If you have any questions coteming wow to karn more about AI, the use of CD-ROM in the NRC Reference library incluocs a diction' Neural Networks,and Expert Library, please call Kim Basile on ary, t hesaurus, zip code guide, world 493394g' Splems so they can eventually apply almanac, style and usage manual.

the methodology on the job, spell. checker,lxiok of quotations, and standard forms and letters Dr. Lambros leis presented an dictionary. Menu Search 1987 interesting discussion on an Electric edition.

Power Research Institute (EPRI)

Beginning April 29,1991, application of Al to BWR Shutdown NTIS DIALOG OnDisc, Dialog the ITS Support Center Analpers. This Al analper simu-Id' h

Information services, Inc., Palo will be managed by

,j8C"'n Mnue aYpNIp a'nt Altu, Californi" Analytical Research for diagnosing abnormal shutdowns Technology, Inc.,

in BWR's. The EPRI application is The NTis database contains g^

^

bibliographic citations with abstracts with a subcontract to npa np[ih ngth indu r) stas I

to engmeeting reports and other research documents prepared by Meridian /Dyncorp knowledge and expertise, federal agencies, their ccmtract5rs Corporation if you would like to join AIUG, and grantees. Covers 1980 - 1990, i ob'tain more information, or have quarterly updates' I any questions, please call Les f lancaster on 492 3969.

I FIS NEWS Page 8

~

^

WISP is Implemented!

~

lh hm Cann, NRR The Office of Nuclear Reactor about two hundred peopic in the schedules and actual hours worked, Regulation (NRR) is implementing direct chain of management. WISP for all the tasks assigned to their an office-wide program called the '

will be the tool to help manage these em ployces.

Workload Information Scheduling tasks and asugnments.

Program (WISP) to improve tl e The WISP pmg.am vill also allow level of understanding and control Typicalitems of work, such as NRR's upper management to see over work in the office. The objec.

Ikense amendments, are assigned to where work is concentrated and how tises of this program are twofold:

project managers for adtninistrative resources are scheduled and utilized.

first, to give first-level supenisors control and management, and to in-Typically, unper level managers will and project managers an interactise dividuals in the technical dicisions want to see reports on the total tool to document and schedule work for technical resiew. Each technical hours devoted to certain actiuties for each task; and second, to ghe ernployee has from ten to fif ty tasks.

for their particular branch or uplwr management a clear and Each project manager has thirty to division. Division technical assis-fi.i active licensing actions.

tants or NRR staff may want to timely pkture of the office's wuri-f load.

format special reperts on issues that WISP will proside a computeri/cd, management believe3 need spccial NRR's WISP program began in the on line method of organi/ing, attention. These same users may spring of 1989 with a prototype scheduling, and auditing the prog-generate ad hoe queries of the data project involving selected section ress of all work in the olfice. Tasks base to answer specific questions chich and project managers. Man, will be added and removed from the from management or as input to agement of the project was ghen to system by the project managers and other reports, the Management Information other task managers. Schedules will Program Assessment Group Pro.

be updated and indhidual tasks The implementation plan for WISP gramming was performed under a marked as completed by the section is based on a hardware and software task order to E.O & G., Idaho chiefs. Actual hours worked are sonfiguration similar to the proto.

After more than a year of study and currently extracted from the Regula-type; that is, personal computers deselopment, the prototype was tory Information Tracking Systern (PCs) provided to each supenisor declared a success and a plan was (RITS), but these will esentually be and project manager and linked formulated to deselop and install entered into WISP. Tasks may be together by a local area network the program throughout NRR.

scheduled by priority (assigned by (LAN). At present, two file servers NRR is resp (msible for the technical the project manager anJ negotiated in our network proside service to resiew and approval of changes to with the technical managers and almost two hundred users, including the operating licenses and safety re.

upper management, or by date, or by all project managers and first and quirements of commercial nuclear the availability of resources. The second level supenisors in two of power plants in the United States.

WISP system will maintain these the technical divisions. Esentuary, NRR resiews, esaluates,and schedules and ensure that work is each NRR professional will haw a processes all applications for being done according to assigned PC link (J to the LAN.

licenses and amendments to such priorities. When it becomc3 licenses for the construction, necessary to insert high priorny A comprehensive training program operation,,afeguarding, and envi.

tasks into the schedule, WISP will is being developed by the ITS ronmental protection of utilization allow the first lesel supenisor to Training Lab to provide periodie and production facilities, with the reschedule other work in a system.

training for project managers, exception of fuel reprocessing plants atie and automated way. This infor-supenisors, and others w ho will use and isotopic enrichment plants.

mation becomes immediately the WISP system, The courses will available to all project managers be taught in the ITS Training Lib NRR emplop about 500 full time whose schedules may be affected by on its newly installed LAN There professional staff members in ten these changes.

will be a course for project and task divisions. Six of these divisions are management and scheduling, and a charged with the technical review of WISP will abo generate reports, course on the use of WISP for safety issues and three are devoted some of w hich will be user specific.

report generation. Classes began in

n the licensing management of the For example, the task manager will April.

power plants and other facilities.

has e a report by each task, detailing The remaining division is the the various schedules and the if you have any questions on WISP, program management and policy de.

completion status for everyone please call Jim Carter on 192 1IM selopment and analysis staff. In working on the task First lesel these various divisions there are superusors will get a report, with frS N!!WS Page 9

1 l

Benchmark Test o

T"b '

of a 1486/25 Standard Performance Test Results Microcomputer by Ralph Landry, RCS Test 386/251 386/25e 486/25 8086 Instruction 2.43 2.43 1,58 John Burton discussed the ins and outs of obtaining microcomputer 80286 Instruction 233 233 L50 systems in the Fall 1990113 Nen.

80386 Instruction 231 231 1.46 That discussion covered some of the contractual and procedural aspects 128K NOP Imop 134 134 0.82 of microcomputer acquisition. But have you wondered about or Do Nothing imop 1.03 1.03 OM considered the factors that go into Integer Add 0.47 0.47 0.24 acceptance or certification of spe-cial requirements microcomputers?

Integer Multiply 034 034 0.25 More f.tust be considered than String Sort 0.74 0.74 0,46 simply the brand name of a system Prime No. Sieve 0.53 0.53 0.22 the individual, or even office, may specify. All systems must meet Dhrystone 7,5863 0 7,586.00 15,172310 certain minimum standards for g

acceptance by the NRC.

Testing for acceptance of a high performance system -- one to be system must be compatible. The the computer with DOS 4.01, as was used for more demanding comput-Northgate system has been tested done with the Northgate system, ing than word processing-- can be w th the IBM Token Ring 16/4 The DOS 4.01 operating system disided into three mam areas:

compatibility with NRC standard Adapter to establish compatibility permits virtually any si/c drive parti-w th the network hardware. The lion to be used, including a single software and peripherals, perform-sptem accepted the Token Ring 200 MB partition for theIsystem ance under standard tests,and per-board using the network default tested.

formance under real applications, sw ich settings. Special memory These test procedures were put into

""II E ***

  • '".not needed, Standard whwam padages wem practice in September and October smce the machtne uses mdust y installed and operated without any sta a

teemm Nas and problems. These included the 1990, after the NRC received a 25 MHz. Intel 486-based system from setup.

, rdPerfect 5.0 and 5.1 word Northgate Computer Systems' Inc.

processkg whwam, Harvard

  1. I

"'e wor ma-Grapp 23 and WawPerfect 1.1 The system was evaluated to deter-tion software was.mstalled an 1 graphics sohware, dBASE 111 Flus mine'if it satisfied the requirements for use as a high performance sptem pu ted acces uh x hwam data base schwam, and hl 2D had no difficulty in opening the spreadsheet software. Allof the at the NRC. This system was equipped with the Intel 486 CPU,8 Token Ring board and loado g the software worked easily and trouble MB of system memory, M KB of

}ransmission protocol and n twork free.

mtedace hem a wd ohmn cache memory, a 200 MB hard drive, is needed, however, for anyoac Standard Test Performance 5.25' and 3.5" floppy disk drives, a m u ng a sptem w% a larp hard lap # drive, and suPCr VGA color monitor. For comparison purposes' drive. De NRC standard operating Computers are used to solve real-system is IBM DOS 330, wt.ich does the performance tests were also run not permit hard drive partitions

  • orld problems in a variety of on the current high performance larger than 32 MB. A large hard disciphnes. In the NRC, th,s i

computer system in ihmech, the drive,200 MB in this case, would includes most of the scientific and PC. Based Parald Processor System (PCf PS) which was oiscussed in the have to be partitioned into many engineering fields. Scientific and smalllogical drives w hen IBM DOS engmeeting users fmquen0y ask W inter 1990 ITS Nen' 330 is used. This can create a how fast a computer is. Standard conflict with the network operating speed tests include the Dhrystane, Compatibility with NRC sptem, since the default login drive which addresses integer perform-Standards is the network F: drive. If a drive ance through a mix of higher-level-has been partitioned to include an F: langu ge instructions,and the Standards for NRC microcomputers drive, a different login drive must be getstone, which addresses float.

can be broken down into the specified for the system. The simple mgpint performance in both single hardware and software with which a way nound the problem is to order and double precision and is heavily r13 NEWS Page to l

l

weighted towards transcendental in our corner of the engineering simultaneously. With the ability to functions. Ik>th of these tests can be world that incans large reactor execute most common data and used with the test suite from the PC analysis codes. A number of the integer math instructions in one Magazine labs to gain a feel for the large reactor analpis sptems codes chick (yle, versus 2 to 4 chick gcles speed and capabilities of sptems.

have been adapted to the PC for the i3%, the i4% shows a The results of the tests are shown in platform. This was no mean Icet in substantial increase in computa-Table 1, with results of the PCPPS itself. Six years ago no one would tional speed over the i3%.

computer for comparison. All tests have attempted to run the RELAP5 show the i4% based Northgate code on anything less than a large The design of the Northgate system splem to be significantly faster than mainframe computer, preferably a board uses a write to memory policy the i3% based miem running at the Cray supercomputer. Now that the that writes from the CPU to the same chick speed, no matter w hat analysis codes are available, we can cache, and then to the main memory c> processor is used with the i3m examine high performance comput.

while the CPU is released to i

system.

ers in the real-world of nuclear continue computing. De system power. The codes used require board used in the PCPPS machine, All of these standard tests mdicate significant hardware; they will not on the other hand, uses a write that the structure of the intel 486 run on anything less than a 32-bit polig that writes to the cache and CPU, which includes not only the CPU, such as the i3m, with a math also tirough the cache to the main CPU but also the to prwessor and co-processor, a large hard drive, and memory. This method holds the L

a cache memorv on the same chip a minimum of S MB of system CPU until the entire write-to-prod uces significant increases in

memory, memory operation has been com-i speed and performance for all test pleted. For large scale calculations, problems. These tests are all Two of the more heasily used codes, multi-tasking, and operating sptems ideali/cd to represent the real world. RELAPS and CONTAIN, were run such as Unix, this produces a large In reality, howeser, they are not a on the splem with standard test system overhead.

true test of sptem performance cases are typical of real world because most of the calculations applications. The results of two ConcluSlons performed can be resident in the RELAP5/ MOD 2 problems and one

(

cache memory of the systems tested.

CONTAIN problem are show n in All of the systems tested have Table 2. The problem times were The high performance system tested, si/able high speed eache memory considerably longer on the i386 the Nortngate 4%/25,is compatible between the CPU and the main based sptem due to not only the with NRC standard software and memors. How will these miems perfotmance of the CPU, but aho to network hardware. In addition, the perforni under real world ' ondi.

significant differences in the design system out performs the highest c

tions?

of the system boards, and the perfmmance DOS-based sptem caching methods used currently used m, the ageng.

Large Systems Code Performance The intel 486 has been desiened to

%, hen ordering a system of this permit an instruction decode /

natwe, one must speafy an operat-Ideally, sptem performance should execution pipeline and integrated ing sptem, such as lilM DOS 4.01, be measured by actual applications.

cache so that multiple instructions that will permit full use of the are in vaiious stages of execution sptem s capabilities. This can not be over emphasized. The NRC

. standard, IBM DOS 3.30, will severely hamper the power and Table 2 usefutiess of any computer Large Systems Code Performance Results equipped with a large hard drise.

Codes such as RELAP5 that require single partition sizes on the order of

{ Time 3SN25i 3863Ec 48u:5 80 to 100 MB can not be run on computers using the IBM DOS 3.30

! REl.AP5/ MOD 2 - Edward's Pipe without special hard drise control-l Problem (sec) 0.461 0.451 0.451 lers and software.

l CPU (see) 273 216 125 The approximate cost of the system

! RELAP5/ MOD 2 - PWR SBLOCA as described would be in the range Problem (sec) 14.22 19.44 98.5 of 57,tXX).

CPU (sec) 443 941 94l if you have any questions regarding l CONTAIN - Muhleberg Station Blackout this article, please call Ralph Land y Problem (see) 500 500 on 492 3562.

CPU (sec) 2,%4.7 1,809.7 tl3 NiiWS Page i1

mum

==m mumm

-sur-mumm ammmmmu6 amme am m umsme M

MM m

= m'

=

TO W

W What is Data Modeling?

The one question a data modeler is Entity Relationship Entity -

most often asked is,"What is data Reactor Unit modeling, anyhow?"

Employee 4

=

Data modeling is one way to Attributes: Unit Name understand the information that is Attributes: SSN needed to carry out tasks. A data Name Assigned to:

etc.

model typically appears in a docu.

Date of Hire

etc, ment which describes ("models")

some real-world information

(" data") used for some real purpose.

~

Turning that last sentence around,it An example of two entitles and their relationship within SINET.

wouldn't be too far off the mark to define data modeling as "informa.

workings of the subject area of the common. A number of NRC tion describing "

project at hand. In talking to the examples spring to mind, including people who work with a given body

" Employees,"" Power Reactor licre at NRC, data modeling is ofinformation, and in checking into Units " and " Inspection Reports."

gaining wide acceptance in the the various practices, policies, an -

An instance is a single mmple of an design of complex databases, both regulations,we frequently find that entity, A single unit, say Sm, Onofre on PCs and mainframes. The value different people look at the same 2, is described as an instance of the of the approach is obvious: before things differently. Yet, the final data entity Power Reactor Unit; you and you go off and build a sptem to hoh. model must function for all points of I are instances of Employee. You some data, you ought to sit down view. In considering too few points are reading,if you're still out there, and understand which data really of view, the modeler may miss an instance of Magazine Article, matters, and how it should be essentialinformation. It follows The first task in any modelis to organized. Data modelingin that a modeler ends up calling identify the major entitics, practice amounts to the exercise of people and asking what sometimcs identifying the exact things about appear to be unusual or pointless An attribute is a fact about an entity, which you need information and questions,and being told so. Other closely analogous to the idea of a reducing them to their most basic times we end up asking three people field used in most database software; relevant descriptions. These de.

the same question, to verify our for example, some of the attributes scriptions,in turn, becorae the basts understanding. With anyluck,a of(facts about) employees are the for designing an actual database.

picture emerges which includes the employee's name, date of hire, social Sometimes the term " logical"is criticalideas of allof the users of the security number, and date of birth, applied to the abstract model, sptem being developed.

As a concrete example,if I knew a distinguishing it from the "phpical" given employce's name, social database implemented on a com.

There is, of course, a formal nomen, security number, and hire date, I'd puter, Historically at NRC, the clature used for all this. Everyjob know all the relevant data about major system using data modeling has its own language, and its terms him. That,after all,is the first thing has been SINET(NRC Corporate are precise and useful. Data we ask of databases: that they should Data Environment), but the tech.

modelers speak of " entities" which hold all the relevant data, and niques are by no means limited to have " instances," " attributes," and nothing irrelevant.

corporate data. While large and

" relationships." While we don't complex systems particularly benefit have the space here to go into the Another thing we seek to achieve is from the exercise (because it is used complete gory details, describing that databases hold every fact once as a basic tool for planning the these will serve to reveal a little and only once, never containing product), any system can benefit more of the nature of the beast.

redundant fields. That is, the same from this sort of analysis, data shouldn't be in more than one Loosely speaking, an entity is a class place, because if it is, it becomes far The day to day work of data model, of objects, people, or places which too easy to update only some of the ing is largely a research task into the have something important in places where a given fact is re-T13 NEWS Page 12

r ---

l I

corded; later, we can't alwan tell That, then,is an overview of data which information is correct. To models and data modeling. It Reducing Your illustrate,if we were setting up a combines a goal deal of mathemati-NIH Comnuter database about emplo)ces and cal rigor with heasy doses of reality t'

T,mesharing reactor units to which they are and a dash of interpretation to i

assigned, we might end up'with the prtkluce a firm foundation for COSTS two entities, Emplosee and Reactor building databases which are able to Unit. "Date of hire 'is an attribute do the job correctly today, and By Herbert Parcover,IRM of the employee. It follows that the ho}wfully are flexible enough to be employce's date of hire is not easily adapted tomorrow. That We all are operating under tight correctly an attribute of Reactor sases us all a lot of time, cifort, budget constraints and Nili Unit. But suppose we siolate this anguish, and error. And that, after timesharing is no exception. Avail.

principle and include that field on all,is the point of a databne in the able funding will not support ever the Reactor Unit record (more first place.

inercasing usage unless we all make formally, that attribute on that a concerted effort to streamline entity). Sup[ose,while updating the if you have any questions concerning costs. But how can we do this?

record of the reactor,)ou discoser this article, please call lxw Clay man that the date of hire was incorrecth on 492-8051.

We can control costs by running entered, so you fix it on the reactor s batch and print jobs during discount record (more formally, on that periods. If batch jobs are run between 5:(K) P.M. and 89) A.M.

instance). Now the date of emplop

~

~ ~ ~ ~

duling the week or all day on ment on that record dxsn's maitti 1

esen if you diligently correct his Incredible Fact wedends, c sts for these jobs are the date on the employce's. and reduced by NN. Use the list i

record,you may not catch some command " Discount" to have your other reactor to which he's also l Computer chips contain

batch run during the next discount assigned. The way out is simply not l circuitry and transistots As period or use the "/' DISCOUNT" I

to carry a field multiple times. This i technology advanced, more statement after the job statement data refers only to the employee,is

could be built into smaller l along with the other control state-therefor an attribute only of em.

areas, such that in 1984 an ments in your program to have it ployee, and good practi[e demands ordinary PC used 120 chips, run automatically.

that it be a field only on the Em.

but in 19M) used only I chip.

ployee record in the database. The By 1993, the 586 chip will hold Store your data sets on NRC private basic principle hidden under all this 5 million transistors.

packs (i.e., NROk)1 through 005) jargon amounts to "a place for escry instead of public packs (i.e., File 01 thing, and eser) thing in its place.'

_. - _ - - _ _ through 99). IRM absorbs the cost of the private packs,while the users' Another important aspect of a data account is charged for public pack model is relationships between WATCH FOR COMING usage. Data sets can casily be entities. Usually these me shown by FEATURES:

moved by using the WYLBUR entity. relationship (ER) duerams, command " Sue As (Set Name) on such as the figure on the preIious Engineering Drawing and Image NROM)l. Once you verify that the page. Each entity is drawn as a bon Toolbox data is in fact saved as rey'uested, the i

and arrows of various Linds with ae.

files in the old public pack data can compaaying serbs are draw n from Automated Office be scratched. Also, scratch un-box to im for the relationships.

needed data sets and all migrated The vert' is intendcJ to describe the AUTOS' Update data sets that are no longer of use.

relationship, for example, an Employee "is assigned W a Unit.

Special Equipment For %sion We can also control costs by climi-This relationship is signilicant inipaired Individuals nating those access initials that are because of the importance of the never or seldom used. Submit an work involved (see figure on preu.

NRC Form 380 to delete initials.

ous page). There is a responsibility Questions and Answers And mose, where possible, data sets to find out w hich entities, attributes, to your PC, and relationships are significant, and Do you have an unique question?

if you have any questions concerning which are not. Here again is a research task insolving points of Send to: ITS NEWS' MNBB 7NP computer timesharing, please and we will provide an answer published in the ITS NEWS.

HS N! WS Pag 13

w.,-------.-i.e-.wm-+-

    • ..w-'e-.-----'"*w*"*"-"4*"'"*""'

" - ' ' * * " * ' ~ * " " " "

" - ^ ^

A4

, ;;; = m - A,mm ar,emsur
ll;.

NE maa as is as on-ama ar mata en ase sus are insa sur as am nuL MMMM MM MN MM

'MEk uIna a a M m a m M== M NUCLEAR DOCUMENTS EEWWWWW SYSTEM NEWSLETTER i

amm.mmesummamammaamarr-s--wsummeimassa m'a.. - '

o-

.x-- 'nv l

l NUDOCS/AD Help in the "Where " area abmc the enables you to scart h through a l

FunctlOnS "Value: ' line will appear.

Inting for a particular code. Access the Query option by prewing the As a part of the continuine senes on lo access the List Values option "lC" function key or by typing the N1 ' DOCS'AD Ik 1p Fun [tions, thn from Ilrowse Records, position the "1.ST < FIELD N AME >" com-attule focuses on the List Values cursor in any of the tabled data mand (in the Command Mode).

and the Query capabihties asailable.

ficids Inted abose and press the This will list valid codes as described A short dncuuion of some new "F2" function key. Using the List above. Next press the "F3" function options that became avadable with Values option during a Predefined key, the screen will clear and the M ' DOCS /AD Version 2 0 also are Searc h is serv similar to actewing it cursor will be located in the code miluded.

from Ilrowse Records. Posinon the area. Either the code or the descrip-cursor in any tabled data field in a tion may be queried by entering a PredefincJ Search and press the portion of the information that is I.Ist Wlun Option "10" function key. The screen will known. TSis is accomplished by clear and a list of valid codes and ty ping a "q " (know n as a wildcard)

ILne you eser been workmg on descriptions for the field from which at the beginning of the information NUDOCS AD and cannot remem-the List Values option was re-used in searching and at the end of bet the acceptable values for a quested will appear.

the information. For example, to particular field? The 1.ist Values search for the docket numbu A option prosides accew to the An experienced user may want to 250, type "9 050002509. To query acceptable values for fields that access the List Values function from the description, press the " ENTER" require standardized tormats the Command Mode scarch method.

key to move the cursor to the These fields are sometimes referred The command,"LST < FIELD deieription field and enter the to as tabled field 3 Not all fields are N AME>", will display the inting of known portion of the code with a tabled helds. The 1.ist Value option valid data elements. If sou do not "9 " wild card on either side, for is asailable for tollowmg that are know the format for the field, the exampic,"9 Research9" To

{

tabled fields:

command "LST FLD" will dnplay a execute either query, press the "F4" listing of all fitids with the correct function key. The prompt " Work-Author Alfihation forma t.

ing.. " will a'ppear. The system will Recipient Affihation Ihket Number then display all the codes and Once a list of values is accessed from descriptions that contain the

{

Reference Number CategoO ans search mode, press the "IV' characters that were included in the Document Type Code function Les to page through the querv.

Related Date Cater"O listing Select the value you need, Domain except when using Command Mode.

Please note that function keys RIDS Code bs positioning the cursor next to the mentioned in this article apply to Fde Center Errect code and pressing the SmatTerm software. CROSSTALK Sign-on Affiliation

" ENTER" key. The code will auto-users should call the NUDOCS Ede lxvel 1 matically be entered onto the flotline for equivalent keys.

Special Cale "Value? line or the ficld from w hich File level 2 the listing was accessed. If Com-New Features in NUDOCS/

,l.ask Number mand Mode is u3cd, note the correct AD Version 2.0 Forrnat code, press the " ESCAPE" Les, and

. hree new features base been added T

then enter the code into a com' mand ihm lo Access IJst Wlues statement on the "Value;" line.

to the sntem:(1) Nine Predefined Searches;(2)1wo New Tutonal

i. rom Menu Mode, the Lnt \\,alues Sessions; and (3) A New User

@en Function option is invoked by pressing the Default Setting Text Search Screen Count' "F2" functioti key while the cursor is The list of salues for each data field hwated on the "Value:" hne. The is quite long. For example, there are The Predefiaed Searches resemble screen will clear and a hst of codes several hundred docket numbers. A the Canned Searches that were and descriptions for the field noted Query function is available that available on the previous NUDOCS ris N w s Pay 14

system. These Predefined Searches C C."

IF M splems. LAVA uses concepts

~

were deseloped and added to the h

similar to those of classical risk ii NUDOCS/AD system per user g

i.-

analpis, but different in approach, request. The new tutorial sessions E _,. j l ;

using techniques from decision provide guidance on using the

/

1 j analysis, utility theory, and knowl-Narrow search feature and on how 4i edge-based expert systems. After to use the Command Mode scart h 12 W

c 1 LAVA's vulnerability assessment hf

l,Q has been performed and scored, a method. The new default setting

% [ p'

- consequence analysis, consisting of allows a user to specify the nutnber j

of screens that are searched for a w' -

")g q dynamic threat, asset value, and term or character string during a At

' '--~~"i" =%

impact analysis in monetary and I

find operation in full text. This is a W

p.?

..Q non-monetary terms, may be useful feature w hen searching eg~

performed. The LAVA program is through lengthy documents for a f-an interactive series of questions specific term.

I' answered by a team: mdividuals m

s m associated with the operation.

For more in-depth information.

~-

~~~

system programming, and manage-

's r-

+

please contact the NUDOCS'AD ment of a particular computei llot Line at 492-8W.

Risky Business installation,in addition to experts in banding consi,uction, securiiy By Emik RoNnson, IRM access, and telecommunications.

l LAVA makes use of the cooperative Risk is defined as the possibility that benefits of these team interactions.

l l

something will go wrong and i

damage will occur. This might be Risk ana!ysis is recommended by the i

applied to your car or your com-Computer Security Act of 1987 and y(gggg puter. With your car, you run the Office of Management and Budget's risk of malfunction, the risk of 'a,gh (OMB) Circular A-1.M A recent IlguaQO maintenance costs, and the risk of report from the National Institute of The following are commonly loss through thef t or accidents. You Standards and Technology (NIST) used local Area Network (l.AN) manage the first two risks with showed that most agencies need to i

Terms, preventise maintenance and the risk perform camputer risk assessments of theft and accidents with insur-and to prepare updated security Multi-station Access Unit ance. In the world of computers or plans for each system that processes (MAU): A hardware device information systems, there are sensitive data. Sensitise data is that make it case to add or extensive risks. Many people know defined ". as any information the remose compon'ents connected about the risk of unauthori/cd loss, misuse, or modification of to a LAN.

access, viruses, and forgotten w hich could adsersely affect the backups. For computer lacilities conduct of Federal programs or the Nodes: Any individual work.

that serve more than one user (i.e privacy of individuals (under the station or computer and other LAN, minicomputer, or mainframe). Privacy Act)."

devices that are connected in a the risks are so numerous that the network.

job of analy/ing them logically can The Codes and Standards Section, be overwhelming. For this reason, ITSB!!RM,is using the LAVA Bridge: This is a device to hook Los Alamos National bboratory software to perform risk assessments one network to another or to (LANL) descloped a software tool of all agency minicomputers and expand a network to a wider called Los Alamos Vulnerability and multi-user facilities, arca. It links different networks, Risk Assessment (LAVA). NRC allowing one network to use all was one of the orginial sponsors of Many Federal and state agencies use the resources asailable on this development and was the first LAVA. LANL publishes a LAVA another network. For example, agency to be a tieta test site in 1984.

newsletter, and conducts LAVA Research has a LAN which user group meetings like the recent connect PCs within their office.

LAVA calculates the vulnerabihty one held durmg the National They has e a bridge which allows or risk measure based on the assets Computer Security Conference in users on the LAN to communi.

identified, the possible threats to the Washington, D.C., w hich was cate to NRR in the White Flint asset, and the degree of adequate attended by NRC representatives.

building. These devices are safeguards and safeguard subfunc-sometimes called gatewap.

tions. The algorithms are based on if you have questions on computer state-of-the-art hierarchical struc-assessment, please call Emily tures and sets of fuuy trees for mod.

Robinson on 492-3490.

eling risk assessment computer 0%

_-w LAB NEWS Hands-On LAN Tralning waiver of the prerequisite. Tell the Now Available!

stan ppm which class you're interested m attending and that you Be sure to sign may already have the requisite experience for that class. We will Are you a current or new user of an Up early for the discuss doth your previous experi.

NRC Local Area Network (LAN)?

The ITS Lab is now offering hands-neW Hands-On cace and yo"r c"ma' " '"i"8 b-jectives with you. If both you and we on Local Area Network (LAN) user LAN Tra..ining.

agree that you are ready for the next g

training. The course title is "Using Your Local Area Network." This level class, we will give you a waiver training will be of great help to the on the spot. It's that easy.

approximately NX) end. users of NRC's 15 operating LANs.

However, we will strongly encourage you to take the one-day "Introduc.

At the conclusion of this one-day mont Building Training Complex.

tion to Computer Resources" course, you will be able to:

LAN Orientation workshops are course even if you are already a held both in Woodmont and at One computer user.This course is White Flint North. Please check the tailored specifically to computing at

1. Access the resources of a LAN by logging on and using a LAN menu ITS Lab Traming Announcement NRC All the equipment, packages, f r session dates, and work products used in the (Network Director).

course match the NRC cnd. user

2. Save and retrieve Wordperfect computing environment. In addi-documents stored on the file server tion, as part of this course, students in your home directory.

How Do I Get A receive guidance in planning their Walver9 futm c mputer edue ti n at NRC,

3. Use the Wordperfect List Files including both classroom training utility to locate files stored in a and multimedia self-paced study group directory.

All ITS Lab courses have prerequi.

OPliODS' sites This is to ensure that you have

4. Print Wordperfect documents on an appropriate knowledge base and both stand-alone and network skilllevel to benefit from your printers.

training experience. For example, Fascinating Training

" Introduction to Computer Re-

5. Use the electronic mail to send sources"(IR) is a prerequisite to all--

Numbers and read mail messages.

other ITS Lab courses. Also, intro-ductory level courses in DOS, Eight trainers taught 300 classes for

6. Follow NRC Security procedures LOTUS, dBASE 111 Plus, and 2,322 NRC students in 1990.

to protect the resources of your Wordperfect are prerequisites for LAN.

intermediate and advanced level Of these,1,856 received training at courses.

Headquarters, and 466 were trained No previous experience using at their regional offices.

Wordperfect or a PC is necessary for But what if you already meet the this course. However, we do prerequisite? Perhaps you've come

" Wordperfect 5.0: The Basics "

recommend that you attend the ITS from a different agency or from a accounted for 26% of all training in Lab's half-day " Local Area Network college program where you used 1990, with 589 student completions.

(LAN) Orientation" before coming Wordperfect regularly. Or you have for hands-on training, a computer at home and already The Individualized Learning Center know the basies of microcomputing.

(ILC) has 6 self-paced Wordperfect LAN hands-on training is conducted courses; 3 of these are available for at the ITS lab in the NRC's Wood-In cases like these,you need to call lending.

the FIS Lab at 492-4744 to discuss a TIS NEWS Page 16 i

WS The To p ssword. This is similar to leaving ChanFe passwords frequently, your car keys in the ignition all of Change Your the time. it's ec.sy io use and you Choose a password that is hard to don't forget w here you left your Computer guess. The password snouid be tcys, but ics aiso ve,y easy for an on.

PasswordI fairly random.

authoriicd person to use. The PC

& Lou Grosman, IR3f automati ally executes the logon Be sure that your password does not routine,which naturally saves Would it bother you if someone "EE#"I " EI e pauw nu n u r&s. Wu Mt were rummaging threugh your file should never be prm. ted on output mvc to 'vt e the information or records.

cabinets or desk? If so, why twt gise rememoer the password each time the same thought to unauthorized you logon. The problem is that no Do not tape the password to desks, one else has to do that either, persons accessing your electronic walls,or the sides of terminals.

Anyone can take advantage of the files? Ilave you changed the password on your computer splem Commit the password to memory.

" user. friendliness." All someone lately? On some sptems you may has to do is turn on YOUR PC, not have changed your password Be sure that your password is not press the appropriate keys, and be v s ble on the terrninal screen w hen logged on as YOU. There is no way since it was assigned to you. Why it is entered.

now? When you LOGON to the to protect your information, since splem, your user ID is not sutticient the computer assumes that the for the computer system to identify Immediately notify vaur computer individual at the other end is YOU.

segy, gy g77;cc, y gu know or feel y

you, the user,in a POSITi\\ L manner. The computer system must that your password has been com.

By following these simple proce.

be reasonably satisfied that the user pomised.

dures, you will minimize the risk of is who he or she claims to be; there.

someone clse learning your pass.

fore,it must verify the authenticity Do not use the same password more word and impersonating you, the au.

than once.

of tre identification. One way to do thorized user. So what are you this is to request something known walting for? Go change your ONL't by the user. You guessed it '

Dan't store the password on the PC password NOW.

the PASSW ORD!

Function Key or in the communica.

tions software. Some individuals if you have any questions about Passwords are the most common program their PC's to automatically computer passwords, please call Lou method of personalidentification communicate w{th otha splenu h Wosman on MM used in conjunction with remote transmitting their USER ID and terminals to deter unauthori/cd access to computer sptems and net.

-~ ~ ~ - ~ ~ - -

works. By changing your password E

on a frequent basis, you minimize the exposure that could result from PROTECT FROM MISUSE, MODIFICATION a possible compromise of the Lh C. p OR LOSS password. For data protection, y

a

_E $

  1. I{3[$ Q,,

NRC regulations require that k*[

a h rne no passwords on computer sptems be

[e

<oyy

,2TOO

/

'jj'ECf',

changed at least once a year. For systems processing sensitive data, l

JJ D r

~

g (9

and Technology recommends that

_ g/yp

/-

the National Institute for Standards l W u

]

-]

~~

passwords be changed every six l

r i

u

.q months. There are a number of l

%, m 'p v( /g y 4g d

major points to remember concern.

_,j s.

Don't share your password with k'

kV 7,pk

,^

,d ing passwords:

4 xf r,3

.y af y

[$

anyone. Keep the password secret N

'T

~/

i 1s f

and secure. Remember,30ur

k. _ I ib,

I rd is as valuable as the data it o

,] 6 ',

h j1

?'

,l I

Never use another person s pass-(

word.

___j fl3 Nit.WS Page 17

t

=

"]"

[% W TD I

%#I I m

ummN E

W

}:

e 4

nk.nuon.t ow nenneuer pra,iae. ii =

RESl?r. DELETES ALLgraphs release (s). In version 2.1 and i

j and inhnket information or ti,terni to s ue you have previously CRIMTFd.

carlier,when using the commands:

conipuser users If yee have any quemuonn

/ Print Pr'nter Range {FSC) j rea.coina rechs.ie.'s ro, rc itena.< u G@E M m our bmbA em one IRM Hotline on 492 4860 of 492.HM.t.

the CRIMTEoption. You are the escape statement will allow

{

ror tm or tic nen., cau 491.um you 4

rney alw drop by and viai in on tw 3c.t 2.

prompted for a name for your graph. clearing an existing range in order to Type in a name, up to 8 characters in input a new one. Actually, this is 1

j length, and press ENTER. You now unnecessary.

have included 1 graph within your

)

worksheet.

Simply code:

/ Print Printer Range i

Personal Computers Now, return to the GRAPil main l

i menu, and choose type. Only then having your range statement Managing Multiple Graphs change the 1YPE for now. Return followed by a tilde will both clear i

in LOTUS 1-2-3 to the NAME sub-menu and choose the existing range and prepare letus CRIMTE again, providing a differ-to accept the new one.

ent name than previously. You now One of the greatest attributes of have 2 separate graphs in your in 2.2, coding LOTUS 12-3 is its ability to manage worksheet.

/ Print Print Range { ESC) multiple graphs. What this means is

]

that one can have more than one To see this, choose the USE option will not clear the existing range, but j

graph per worksheet. These graphs from the NAME sub-menu. You will will take you back to the previous may use diffenng data, and may be see the two names you previously menu,even if a range already exists.

of different types. Graphs can be.

entered listed along the top of th'e Therefore,if you have the following' selected and de-selected for viewing screen, just as when you list work-macro coJc:

4 or modification as desired. The key sheet files. Put your cursor on the

/PPR {FSC) to the use of multiple graphs is the f rst file name,[$ress ENTER, and

^

ftei I II then view the graph. Now, go back in version 2.2, an error will occur at to the NAME menu, and USE your the command following (ESC), in l

To begin, create a simple graph.

Other graph. View it. Yo(i should short, if you have (ESC) following /

ameen two hent D M.

% m any Wus mano, H is bcHer After your graph is created, choose graphs of the same data.

to remove the { ESC} from your the NAME option from the GRAPII code. That will make your macro main menu. You are presented with Finally,we need to discuss a part of code compatible with any version of 4 options, USP, CREATE, DUI. lire, LOTUS that has always been a bit letus, at least as far as the print and RFSET.

e nfusing % hen you choose the rang ( is concerned.

I Let's h>ok at each option and its SAVE option from the GR APli 1

I" "'""

  • menu,you are saving your graph out dBASE lil+ Tech Note to disk with a.PIC cxtension for about Report Form Prob.

USE -Allows the selection of future printing from printgraph.

lemS:

previously CREATED graphs as the u are not sadng yom graph for CURRENTgraph. { When using worksheet use. To do tbts, select!

1. Problem:"My report isn't in the multiple graphs,one of them is File Save and save your worksheet.

order I want."

ALWAYS the current gtaph, just as Your gr phs are saved with the Resolution: Create an index and there is always a current directory at worksheet just !ike the data are and then run it immediately before DOSJ any macros you may hiive written.

running the report form. Type theses lines at the Dot Prompt:

CREATE-Allows the providing of a LOTUS Macro Warning name for cach individual graph or USE database INDEX tidxname

- modification made,so it may be REINDEX

{

USFd later.

On a different note, a discrepancy l

has been noted with macros runriing REPORT FORM repiname This sets the records in the correct DEI.ETE-Allows the removalof a in version 2.2 and earlier version (s)/

graph from a worksheet entirely.

order for your report.

rIS NtiWS Page 18

iiii

-r--

TECH M

M M

M M

=='N "T"

Q M

M W

!s sp um ~.,,,.

g..

2. Multipit Columns Resolution: Af ter typing in the that can be brought into a word name of the first field name, follow processor for editing and printing.

Prublem: "I can't get uli the fields I want to print acnm t'ar page."

It with a semi-colon and then type in The only other alternatise is to write the next Geld name. This works if a program that specifies w hat is Resolution: Change he Report I" " " " "

Forrr. to 132 for the Pcce Width il } I.. K G f dot imittiv

4. Problem: "I want to word wrap 3

printer:

my test field.

Centers at 492-41N) or 4924)353.

Resolution: %.ord %. rapping is SI:T PRINT ON handled by the width dbas e or you

? CllR(27) +"C" select when you design the form. If

(&& go to comprewed mode) the field is long and has a lot of INEL 3

NLT PRINT OIT blank spaces at the end of the field, l

RI: PORT I ORM filename 'l O you will find blank lines being Tape Default Change t

i RIN'I ponted in inappropriate places.

  • f, g in order to proside an unimetrupted

)

5. Problem: "I only wunt certain pool of available tapes the INEL

[3, gf ' '

"['*"I *"d * )

reconh to be printed."

Tape Library imposes an automatic Resolution: At the Dot Prompt expiration date on magnetic tapes.

1imits: Width of paruer type in these lines:

If yo do not specify a release date iI this does not wo on sour dat

" F "$" '

I#'

l matriit, check the codes in your "W I'/

nuon ped of hW hp p M Al.L FOR condition dap) will be assigned.

i; pnnter manual.

REPORI, FORM reptname R

ALL A1.1.

INEL encourages all tape users to For the llP L;iserJet, use this I" "#'b I sersion for Landscape. Comprewed i

n np on unent tape printmg:

6. Problem: "I want to send the holdings. T ou must use report to a file to be printed out l

SET PRINT ON through a word pnicewor."

' IRS,OP = Audit for all cartridge

?Cll R i 27) +"F" + Cil R(27) +

Resolun,on: At the Dot Prompt taEes. Please note that for all taIses i

" All O" + Cll R(27) + "o l 64611" type this:

w a re n pc lonyt man I

REPOR'l FORM filename om' month, CO&DP informs you, by ma apes t are MukM to Cll R(27) +"E" REPORT FORM TO Fil.E Glename

(&& return to normul) rehed wMn We mt My Sl!!' PRINT OFF dBase will send the data to the 4'

screen and to an ASCll file that will On occasion, the TRSERS data Limits: %,idth of print area be given the extension ".txt" auto-L The report form must be set with a matically. The ASCil file can then files may become corrupted from system l'ailures. While every effort is page width of 170, the lines per be brought into your word processor page are 44, the lef t margin is 5, and for cleaning and printing.

made to recover tape management the nght margm is 0.

transactions,100G recovery cannot be guaranteed. Such events are n eim d m1 Me how announced via the on.line bulletins.

You can stay in Portrait mode by omittine this command' my n[w emnn out.,.

Resolution: At the L)ot Prompt if you have any questions regarding

+ CllRi27)+"&llO" and b, Courier 10 Iitch font can be selected type this:

tape management procedures and'ot by substimting..(s1011,, for pohetes, please refer to "lNEL olftfAll on the second hne.

COP)' FIELDS field t, Geld 2,..,fieldn CRAY User's Guide," "INEL CY.

TO filename DELIMITED WITil,

BER User's Guide," or TRS User's Guide." For additionalinformation

3. Problem: "I want to hase one The comma is the separator for each or questions call Emily Robinson on field print under another."

field of data. This creates a test file 492-34 %).

l rrs Nt.ws Page 19

,. _ _ _ _ _ ~ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

I I

NUCLEAR REGULATORY COMMISSION I

I I

I I

ITS SUPPORT CENTER FACILIT1ES TRAINING LABORATORY FACILITY l

i I

~

g I

.tk..:

location:

3rd f kur Wcxdmont Iluikling g

8120 Wcxmimont Avenue, Phillips lluikling, Rm P-358 One M hite I' lint North,3C 12 lietheada,MD 20814 I

7920 Norfolk Avenue, 11555 Rwkville Pike, I

[

Dethe.da, MD 2tE14 Rockville, MD 2tE52 Phorw: (l'IS) or (301)492-4744 Mathtop: WJM g

I 1%,:

Imhorntory llours: 730 a m. 4:30 p.m. M-F I

I (l*lN) or (301)D2 4160 (l'I5)or (Mt yl920353 I

l (l'IS) or (301)492 M57 Cl** Ilours: 8.30 a m.

330 p.m. (except M5) g Center lleurs-S'" k" I

I l

730 a m. - 415 p m, M-13

  • lhree cl.mrooms for formal ADP training including one equiptwd g

l l

with eight IllM XTs, cae with eight ASTM and one with eight S,n w PSO Model 30 286s "llandson" instruction in the use of l

mwnicomputers and timesharing systems, I

l Mwnxumputer auistance, stand alone and LAN,(Telephone, l

g Walk-in & Site Wit), Demos strations. ADP Technical L.ibrary, Note: The Training laboratory is operated by the Graduate Scigiol, and ComputerNklen based Tutorials. NRC Project Of0cer, Mt USDA under contract and managed t'y the Office of Personnel, to Phyths Smith (4924098); managed under contract tiy Mr. t re P"' vide training in end-user computing for the NR" staff.

I I

Taylor, Operations Manager, Analytical & Rewarch Technology, Technical guidance is pnwided by IRM. NRC Project Manager, l

g inc.

Carolyn Bauin; GS/USDA Training Manager, Kathy lleckman.

g i

I NRC END USER COMPUTING SERVICES DIRECTORY I

I I

I Mkrocomputer llarpare!%ftware Arqubition, Upgrades:

SINIT llotline: 4924222 1

Please ocntact your local ADP Coordmator to initiate this action.

NUDOCS Ilottine:492 4603 I

l John Hutton, P-5 % 4924G I AN Ilotline: 4924:43 l

Mkrocomputer, wurd procew>r,other A11P Rebwathm:

Data General Systenn Problenu:

1 Please contact your local ADP Coordmator to imtiate this action.

Judy Sccherman, P400,492-Wi87 I

l Yolanda Stokca, P-5m,492-4572 g

g Mkrocomputer liardware Imtalt.ition and Mainteirwnce:

IliM 9170: Dave Bamm, P+00,4924308 g

Karen McElyca, P-500,492 mo

l litM PROF SI. Mall Support: Sharon Root,0%TN 3Cl2,492-0256 Mkrocomputer Software Installation:

1 I

JenmferDuMont P,500,492 8317 Electronk Records Support:

I g

Wosd Processor,Other ADP Maintainence:

lirenda Shelton, MNilH.7714,4924132 l

Please contact your kical ADP Coordinator to initiate this action.

I re llerry, P-500, 492-M32 Automated Graphks Support: Kathryn O. Greene,2G 40, 492021h I

g Mmlem and Dela 1.lne Prubletus:

g mmerc al Datahw Support: IUlcen Chen, P lf 0,492 8501 g

I id ) ta I i c

lun:

i Stan W(unt, P412,492 7723 Scientific Code Dhtributkm. NESC: Sharon Root,3C 12, Computer itcom: Philli[m 492-7713 White I-hnt 492 OM5 I

g Shared Information Network (SINET) Developnwnt:

g Pomputer Security: Inuts Grosman. MNilll-7td)2,492-5019 M M " ' N U' M D I ENSIS: John Beatty, P-712,492-4164 i

Timesharing AcceWith: lictb Parcoser, MNiin 7602,4924r 99 l

l Systenu Deselopment and Modifkation:

l l

I!wr Support for liardware/Softwne (PC & Nill):

IblIUNIl00 P-712 4924322 Il5 Support Center, Phiuips lildg, P 3 %,492-4160 lhCL IldflIn*l, P-712,4924328 g

One White I-hnt North,3C-12,492 0353 I

l Schedulin;t for ITS Trunning I#aatory l

l Data General and int'L User Support:

IM Cunningham, WJM, 1 44744 Errsly RoNn.nn,3C-12,4924190 Lo

_a J

I l