ML20094L475

From kanterella
Jump to navigation Jump to search
ITS News.Volume 8.Number 1
ML20094L475
Person / Time
Issue date: 02/01/1992
From:
NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM)
To:
References
NUREG-BR-0056, NUREG-BR-0056-V08-N1, NUREG-BR-56, NUREG-BR-56-V8-N1, NUDOCS 9203250274
Download: ML20094L475 (20)


Text

-.

E summmmmmmm -

WINTER 1992 M

h-Voi,8 No.1 E

NUREG/BR-0056 mm N M

M M

[ *%

U.S. Nuclear

/*

offke of infornation Information Technology Roounn Mmgerient Services Support Center Regulatory and Training Laboratory

\\[....

C M ss'm O'I'c e f Personnel T,eT,reat b Always resent 3

By Emily RoNruon, IRAI What threat!

The threat of computer virus infectiu on your diskettes or in your 4

[

microcomputer,

~

The threat of computer virus

[ / r#

C1 h

Infection that may damage your memos, your spreadsheets, your v

y

\\

briefings, your valuable work

[(\\ h products! It may also damage your N

s system soAware and your standard

\\

sonware packages, i.e.,ILM PC-DOS, dBASE III.

The threat of computer virus

[

infection that was perpetrated

-; f ~ '

maliciously at first, but is often d*W J

introduced inadvertently as people Q,

share software, send diskettes to one another, or take information from unchecked sources (same reputable bulletin boards and computer services recorded PC virus appeared, and the presented to it, and the common are already scanning for viruses, most common ones(Jerusalem and viruses activate when an infected file because of the worldwide epidemic).

Stoned), are now 3 years old and is executed. Those integrity show no signs ofgoing away in this management programs that exist now Remember the mainfmme cra? Ewa country or abroad.

have been layered on top of DOS then, your information was at risk and owe their success to the from other users. Everyone worked on Your computer hasn't been infected relatively unsophisticated nature of terminals cotmected to the central yet? Lucky you!! But watch out, the virus attacks. Already there is an computer system, and programming this threat can occur when you least increase in boot-sector siruses (the errors could destroy a - a's data. All expect it. Surely you know someone part of DOS that starts up your the security features and integrity who has experienced a computer computer) and partition-table management were then the virus and wondered how all this infections (the part of DOS that responsibility of the mainframe aid have happened.

assigns your file to tracks, a diskette operating system and its or a hard diskt Recent discoveries administrators. The user didn't have it happened because the most.

in Europe indicate that much more to worry about such things.

common microcomputeroperatmg anovative attacks are coming.

system, IBM's PC-DOS, has limited Integrity software tools face an uphill Now we're tu the personal computer built-in integrity check and development battle because (PC) era and the snuation has changed protection. DOS will happily considerably. Five years ago the first attempt to execute anything (Gmrinued on Page 2. " Threat")

9203250274 920201 PDR NUREG BR-0056 R PDR

(* Drear

  • Cere:ued/ rum page 1) speaker; and anotler on Decemier 2nd,NationalComputer Security commercial presaires urge them to Day, with Jim Polk, Nationaj THE ISSUE AT HAND be as widely useful as possible while Institutes of Standards and tie user community want them to -

Technology, as speaker. More than maintain compatibility with allIBM 40 staff members si ned up to obtain

  • *"# I' ^'"Y' #'"'" ~"~~

I S

. PC DOS msions.,'

I4milofClasahd mi sensee Unda=.

virus checking software. Did you? m sa Pc ame L 2

w lacal area netwuk G.AN)architecus' The virus seminars were videotaped.

" " ' " ' * ' " ~ " " " " ~ " ~

~

~ ~ ~ " ' ~ ~ ~ " ~ ' " " '

is relatinly rew,by compirison,ard The Cl(gStohl video "The KGB, 7he has been dewkped with features fw Computer and Mc"is also available.

U""

~~~i~,[

Im'ble implementata ofsinwe' You may borrow these tapes by u ue __.

6 n

secuntyandviiuscd floww, callkg EmilyRobinson on 304 3490 soon,qu.ney Assmace Training 6

. these h are M alwayuned orF7596f J490.

sos.we rxchange & InGamahon Activity 7 h of s)$em repswe WCion.

kcurity in Dectroni: hkanung (e-mail).

LANs connected echr L.ANs,tingh oc,,,,,,,y,j,,j,,,,o3,p,,,

Things yw shwu Know...

_ 7 galewsys aridluidges, permit oller Demming. Addison Wesley,1990. A trah.

Cosmolkng CorrederTinwnhanng Costs _ $

opportunities fa viruses to trawl. -

quoted book now available in the NRC 1ANDelaBase Antications Ubary.

Artifm:in! Intelhgence User Osoup -_.m

. 9 You, the user, have a defense shiekt. It nowi

_ 9 is called virus detection softwure.

Convuier w anh _ _ -

9 v

Presunung your nand-alone PC or A Da Too Uunt _...

9 network sysicm is virus hre,the F me WNUttXWADUm$ggemonBox 10 i

infectior source is adiskette that TwoNewSINETSydemsConug. _. I2 mMaingwuan _J cmies avirust Foryour<mn pjgpgggl g{ (lg3gjfjgd We protection, the safety of your work, and in cmsideratim ofpwple wto share and $gn$jtjyg the netwcsk with you, please get a virus chectog aware package nd Unclass,ified Paper check every diskette that you receiw.

ITS NEWS CREDITS To be sure that a boot-sector sirusis Waste not hiding in your sygem, boot uP By Wayne G. Burnside, ADM from a knownirus-hee,wiginal' W m NEwsis a quanedy publicadoa provkhng informanon of mien e to unen of write-protected DOS disk, and tien use "Ihe Nuclear Regulatory Conumssion

,,,puter tew a the NRC. It is the virus detection software. The NRC (NRC)uses one metinifutie pwhred by the safTof the NRC has a sitelicense forIBM VIRSCAN collectm and degruction of classified taronmune Technology services sumort ard }" can Eet tie lates wision b7 and sensitiw taiclassified peer wnue, Cnier and Tnining u>ontory in cnajunction with the NRC's Ofke or calling DaraGcedon on492-9974 or aidanothermethod fwravpaprmedia p,,,,,t _

FIS 492-9974,:

(e g., crsnpuser diskettes, ribbms, ami microfiche). Receptacles fa the we wisww quemians and amnwats l

The NRC has established self service 1 conection of classified and sensitiw ad "i'l**

l Muse wnumhe m manbn disk scarning centers in the -

unclaifkd paps wage haw been.

' following IO0ations:

placed in manerous locatims throughout

. Phone:492.s109 all Headquarters buildings. Do not place Mailor in Penon: hlNDD.7602 ITS Center, Phillips Building p rmediain kse recepxles

' Penthouse -

laa Schwartz,lRhtTTSD Executivs Editor "De Division of Security (SEC) collects ITS Center,OWFN 3 C8/10 the papr wste eachWednesday fw Oraduate Schoo0USDA You are encouraged to check any transpat ea facilitywhereitis Pumados Coontinuon and all disks received from an destroyalandrecycled. Nmfaper

- outside source before using them.

neliaarecoDectedbyp Wiena j,7,*,j,,{, 9 g

stflicient quantity is accumulated by RecentlyIRM conducted two virus

SEC,it isthenimguiwd to a fxility IHustadou ud Concepu by NRC Aut nute nphics Section l

Seminars, one on November 7th, where itis destro)td, WithJamesVavrina,IJ.S. Armyas Contributan to ngular items art Employees who have non-paper M. lMnws, W. Whm. E. IWiinson. P.

"rnen win Always De a hat...

media to dispose of should contact Snsth,C. hkmil h formation Security Pro 4ruct NUIT. May/

SEC's Facilitles Security Branch on t

Jun 1991.

492-4122 or FTS 492-4122. m l;

ITSNEWS Page 2 l

bOSO g tivir ATM receipt or cocial security up, have a stalmg credit repat number a secord thought, yet to a substituted, or get " confidential" Sink Ships tuerarmed with this informatioa. a inronnation on others from the credii consumer's private innking datais datainses. In some cases of revenge, "I'I M##

an open book. Bank clerks have bad credit reports have been (Ihis article is trprinted, whh the teen known to make a duplicate generated for former spouses or ATM card for someore witlout even others perceiwd to be enemies.

author's permisstort fivm the lo, Alamos NatiorialLaterarory, requesting positive hientification Within the last two years, ajuwnile f rst. All the individual had to know hacker entered tle f les of a major Security System Bullerin, Vol. 6, No.

was the account number. Private and national credit reporting agency, j (fppfj,p yj federalinnstigators; people with copied out account numters, and coruicctions into the banking, published them on a computer Computers have become such a lending, or investigative professions; network bulletin teard. One of the common part of our daily routine and disgruntled employees working major bank credit cards hasjust that we hardly notice them. Our lack in those fields can get consumer announced that it will set up a charge of awarenet.s, coupled with an infMmation from loosely potected approval system that will transmit ingenuous attitude toward the data bases. For a nominal fee, over a radio tetwork. No mentkm importance of the information through a pivate investigator, FDIC was made of data protecthn computers contain, can lead us to ard FSLIC account activity records sink our own ship and the ships of are available on the individual bank Virtually all compute data are others as well.

account level, showing all balances sensitive from some perspective.

Individuals need to be aware of data and banking activity for that Several months ago, the following particular account. These reports are sensitivity or value and should not headline appeared in the newspaper:

fw sale to investigators by company distribute information thoughtlessly.

" Britain's Gulf War Plans Lost in employees. It has been estimated in the case ofinformation that may Theft-Computer Taken from Car in that as much as 90 percent of be classified, individuals must take London." The officer who had computer fmud is perpetrated by tle initiative immediately to custody of the computer had casually employees.

(indicate) the level of the left it on the tuck seat of an infonnation, not casually mention a unlocked car, and the computer was la the credit information field, nedit week later, "Oh, by the way, that stolen.

bureaus and odwr credit reporting data is classified." Such incidents agencies are also notimably tax with cost hurxtreds of dollars in remvery At one naticnal laboratory, a consumer information, so tax tiet an time arxl eiTott. We mun allleam to graduate student who was doing illegalindustry has come into practice responsible computing every leadmg-edge research for his existence. Fct a fee, the consumer day. Remember, hue bits CAN doctorate left for a holiday without can get higher credit report cleaned sinL ships.1 m securing his computer or data files.

The student's notes and research were stolen fmm the computer by his advising piofessor,who published i

them under his on name.

Data does not alw3ys have to be I

classified for its loss, damage, or theft to have a catastrophic efrect. In the academic area, researchem are o!ien touchingly naive when it comes to protecting their data.

Q. O. O

N Being out of the corr mercial main D

stream, they do not realize the value C

lb a

that research can have. The private j

y sector fully realizes its value. Many e

companies protect research and N# n development data at alent commensurate with Top Secret M

)

Consumers are also naive about data protection. Virtually no one gives ITS NEWS Page 3

i S fiware engireering technologies -

Software Quality lnnOYatsonS and methods, Organizations can ByhfarkE Stella, ACRS affiliate with the SEI at one of three basic levels;(1) the information This article tv fefy describes some of the quality of all types ofsystems exchange level,(2) the technology the trsues associated with she that depend on software, cxchangelevel, and (3)through Increasing use ofsoAwarr-dependent The SE1 was founded in 1984 to residence ofindividad technical systems a sqfety-related applicattura support the defeme soRware personnel at the institute.

at nuclearpowerplants, development and user community, The NRC presently participates in but its charter has recently been the SE1 affiliate program at the expanded to permit it to apply its information exchange level,by Software Engineering expenise in support ofother supporting NRC staffmembers' government organizations as nuendance at the annual SEI in much the same way as a hardware recommetded by the U.S. Congress

^

8 #8 I*

"E component is developed from a in 1990, it is staffed by more than and loaning to stafTSEI educational r

e concept to reality, a specific anicle 250 technical and support personnel, E"*

  1. '8 ""d

" "' **W

ofsoftware can be created through dn, wit primarily from industrial an g af nna dhms the application of a systematic organizations and universities.

with SE! technical staff on specific engineering process. Software engineeringis the term used to 80 Pics.

describe this systematic process, which encompasses the definition of.

NRC Affiliation with the SEI A P cability of SEIWork P il fiw e gi des ofthe

.More than 900 panicipants fmm softwwe,its coding (or academia, industry, and govemment to NRC Needs programming),and testing to prove met in husburpi (w me 1991 ne NRC stafimembers at this S ftware Engmeeting Institute its integrity and suitability for use in

- alarger system that includes both Affiliates Symposium during the year's aElates symposium were

' ft" and hard*.*'*'-

week of August 26,1991. Included present, m part, to assess the in thislarge group were four NRC p tential applicability of SEI work to NRC's cuent and future needs fu Because the use ofdigital techtiology employees: Joe Joyce of NRR, is increasSg throughout our society, Emily Robinson and lais Grosman licensing and regulatmg nuclear it becomes ever more important to oflRM, and Mark Stella of ACRS.

power plants having computer systems important to safety.

ensure the integrity of the software The SEI maintains an affiliate used in these systems. De Software Engineering institute is dedicated to pmgram eat suppons a large mmber dW@g Wh 8'

et od that 11 e e ual y

of the software used in all types of -

incidng se aEiate programs,de analog P%N d ced

'a licati SEI hopes to accelerate the systems wh distal systems.

dissemination ofinformation on new Evolutionary and advanced reactor designs n>w heing reviewed by the staff, such as the General Electric -

Advanced B iling water Reactoi.

. The Software Engineering f^

) "" O# ""

"~

institute Standards Collection" including Engineering System 80+, utilize De Software Engineering Institute.

the Standard Glossary of computer technology extensively in

- (SEI)is a unit of the Carnegie Softwwe Engineering their control and protection systems, Mellon University (CMU). It is a -

Tennielogy.

as wellasin their control room federally funded research and display systems. Each of these

,, PP 'd 8d8 "

applications depends upon properly il development center that is sponrored Jfeasurement by Capers Jones, engineered software for reliable and 1 y the Department of Defense, McGraw liiH Softwwe (DOD)through the Defense safe operation sind for obtaining the Endneering Serie; necessary level ofperformance.

' Adynneed Research Projects Agency (DARPA). Re SE1 missionis to Now available in the NRC he rapid comersion to digital pmvide leadership m advancing the Library-technology m aclearpower plant state of-the-practice of software

- engineering, with a goal to improve (Conrhed on Page J. "Sopware")

ITSNEWS page 4

(%ff=we" fha fage4) ett'ectiseness of fonnal(tlat is, may occur in the more complex part designs requires that the NRC staff mathequticaHy grecise)mednis fa of die system and takes contml of the increase its expertise in this area and, venfying de correctness of a software system until the fault in the complex more specifically,in the areas of implementation is also under sttkly by so0 ware has been cleared.

software safety and schability. De the tecimical staff of the SEl. We need to obtain a better understanding Nuclear Installations Ittspectorate of Not only the NRC but other of these topics drives the present Great 11ntain ins recently suggested regulatory agencies worldwide are NRC statTimerest in software ;

tlut die Sizeweil B computer 4med being confronted with the engineering and related technote<;ies.

reactor protection system sollware be challeriging task of certifymg the canpletely reviewed tim > ugh testing safety of high-performance nuclear Actise research at the SE! is under tint inchxtes the use ofsuch formal power control and protecuon systems way in a number of areas. Three methodt using complex software. Such which may be of the most relevance software cannot,in principle, be ne real-time distnbuted systems tested compktely to s erify its Not only the NRC but research area at the SEIincludes reliability. T he ZD AK and related work on e so-called Zero Defects design appruaches are consistent Othcr regulatory nycncies Applications Kernel (ZDAK) De with the licensing criteria and itWrldWide are hcing ZDAK is a design approach that principles that lave been found Y~

Y ""

  • * Y" Y#

" Y"Y ConjiOnted 96'ith the redundarwy, with assured reliability the safety of mechamcal systems =

challenging task of of function, in sonware impatant to ne expanded understandmg of ccc//[f ng the Sa[cty of safety. A simple block diagram of sot) ware engineering prmeiples and i

the Zero Defeet Application Kemel pmetices that can be obtained b/

high-perfarinance nuc/ car (7939 concep,is sw.n in ngurn working more closely with -

potwr controland it relies upon the parallel operation organizations such as the SEI will

"'""'i*d******'"*'"''*

' "*** "* N R C *'* "' '

  • b'"" ** *'

protection sntents using achieve the desired system function:

the safety of digital systems now coinp/cA Softts' arc.

one module is complex and, being planned and incorporated into therefore, virtually impossible to nuclear power plant designs a

to NRC's present needs for certify as rehable, and the second is improving internal software quite simple and because ofits Questions may be addressed to Mark Stella on 492/ 344 or ITS 492-7344.

engineering expertise are the simphchy, completely verifiable i

software process area, the sot 1 ware ne complex software provides the SEI documents 4md symposia engineering techniques area, and the high performance necessary tbr presentation magnals may be real time distributed systems area-nonnal system operation, while the obtained from Emily RoNnson on simpk sonware detects faults that 5%3490 or ITS 943490. m in the software process area, the SEl has described a systematic approach to creating software based on the l

r-L best practices used in American i

software development shops.

I Complex

- Adoption of and adherence to a Software systematic process for software development can improve an organization's abihty to consistently l

desclop high-quahty software He r

requirement for the use of a

[

. au __l l

- controlled process in the design of Slmple Fault Testing

-- safety-related systems, components,

-and j

are System Control and structures is a key tenet of safety regulation for the U.S. nuclear power m

g Software engineering techniques being researched by the SEI include Application Kernel a number ofinnovatise methods for -

obtaining software with high reliability and integnty. He i igure i, G:neral Configuration of Zero Defect Applicati,m Kernel i1S NEWS Page 5

P Softwara Quality Software Quality AssuranceTraining for the

' Assurance (SQA)

. Division of High-LevelWaste Management Seminar Update 3,y,nn,,u Noou ona

~

John T. Buckley, NALG A"E"8' b#0**#'

. Assurance seminar was very popular The Division of High-Level Waste QA controls for software, and with NRC technical staff because at Management (llLWM),in the Office methods for auditing the of N clear Material Safety and development and use of sonware 1 e to NR th INEL Safeguards (NMSS),has the under such QA controls _ HLWM CRAY computer. Earl Marwil. an responsibihty to review the U.S.

staff worked with Office of NRC contractor from EG&G Idaho Department of Energy s(DOE's)

Personnel training statTto develop a Inc., presented a talk entined, application for a license to construct statement of work (SOW) and,

" Practical Experience with Software and operate a geologic repository for through competitive bidding. secure

- Tools to Assess and Improve the high-level radioactiw waste, the ser ices of a professional famihar

, Quality of Existing Nuclear Analysis HLWM also has the responsibility to with both computer software and QA m nit r and c mment on DOE's site to provide appropriate tram, mg for and Safety Codes.". If ou Iwve 7

computer programs that were characterization activities during a HLWM staff. De initial course was deseloped before any structured pre-license application consultation completed in August i991, and uns 97 9

y gg emphasis on SQA, you may want to g,

3 g

use these tools to verify the quality g

of your codes. Did you miss this compliance with NRC regulations, Decommissioning, and the Office of

[90 o IT 9 DOE must develop and use Infonnation Resources Management.

9 borrow the video for SQA Seminar munmus s Rware pmgrams that A second training sessionis plarmed

  1. 8. Videos of allprevious seminars m del c mplex physical systems.

for April 1992.

HLWM must monitor DOE's an matena s are als development and use of this The bulk of the 5-day coune soRware. It may also develop and c nsisted of description and use its own software to verify the -

discussion of software QA program results of DOE models.

characteristics, based on a variety of United States and intemational A BitToo Literal-DOE is required under Title 10 of standards. The soRware QA (From Editors Workshop Newsletter.

the Code ofFederalRegsdationr ()0 requirements described in the DOE Denville. M June 1991)

CFR, Part 60) to implement a 10 Office of Civilian Radioactive Waste CFR Part 50, Appendix B quality Management GA Manualwere At the dawn of the computer e.ge,

. assurance (QA) program and apply it analyzed, as well as the guidance artificial intelligence was immediately to site characterization, design, provided in " Final Technical pressed into service for translating construction, and operation activities Position on Documentation of documentifrom one language to of the high-level waste (HLW)

Computer Codes for High-Level another. He approach was quite

- geologic repository. This means that Waste Management"(NUREG,

- senightforward. A Russian wtxd in a.

DOE software developmem and use 0856), and " Handbook of So0 ware bilingual dictionary is rearranged with must also comply with the QA Quality Assurance Techniques the English equivalents into a sensible :

. regulatory requirements of 10 CFR Applicable to the Nuclear Industry" l

' sentence.

Part 50, Appendix B.

(NUREG/CR-4640). Prototypingof software, validation and verification Unfortunately, these literal translaticos HLWM has begun a training o/models, and documentation and oRenleR mtich to be desir*d. When program for members of the auditing of software QA programs -

the Biblical phrase "he spirit is technical ar d QA staff and the were also discussed in detail; and a willing but the flesh is weak" was -

Center for Nuclear Waste Regulatory sample QA audit checklist was translated from F-n,it became

- Analyses (CNWRA)(a federally-reviewed.

- The wine is agreeable but the meat is funded research and development

. spoiled"in English. Another;rogram -

center contracted to provide The course will be modified, on the would haw translated the slogan technical assistance in the area of -

basis ofstudent comments, so that

" Coke adds !ife"into the Chinese -

HLW)to improve their the second session will emphasize equivalent of" Coke brings your understanding of the development quality software development more

~

. ancestors back from the grave." e and implementation of nppropriate and auditing less. m ITSNEWS Page 6

l l

gC3 gOftWare ccordinates with E 4 and NRC stoff normally conveyed by telephone, regarding distribution of NRC.

they may fail to recognize die Exchange and developed software to foreign secunty nsks inherent in this type of countries.

communication. E-mailmessages Information Activity are sinted records of For more infonnation about the communications within a computet, hrShanm A Roor. IRAI distribution of NRC scientific and Telephone conversations are not technical computer software, please stored The Nuclear Regulatory Commission call Sharon Root on 5042256 or (NRC) recently entered into an FTS 96&2256. m Gosemment-provided e-mail is agreement with the Department of intended for ollicial and authorized Energy (IX)El to operate a software purposes only. E-mail users must exchange and information activity exercise common sense and good fo, the NRC. This activity will judgment when using this proside the means for managing and SOCunty in Electronic C,0vemmeni,esource. personai and unofficial use is prohibited. NRC controlling the dissemination of Messaging (e-mail)-

..m ii,ys1,m, saould no, se o,ed to NUREG-documented computer software developed under NRC ThinosYou Should 4t' semi" info'" " " ab "' "">

o non-Governmental activities, spomership. A central facility will serve as a software infonnation KnOW.

inclWing, but nWimited to, center in suppon of NRC offices, charitable events,,eligious NN"U

"""' INSI observances, fund-raisers, and NRC contractots, and the public.

Electronic mail,"e mail," is one of personal business. Employees who This activity was previously abuse their e-mail privileges may the mmt popular applications performed for the NRC by the have them withdrawn arxl may be designed for local area networks National Energy Software Center (LANs). By sendmS and receiving rubject to disciplinary action.

(NESC) at the Argonne National messaps cleenonically, LAN users Employees must remember that no Laboratory. DOE centralized the can communicate quickly and NRC LAN was designed with the management ofits scientific and e0iciently. Many LAN users are safeguards necessary for handling technical computer software by able to identify an immediate classified (national security) transtaning the management increase in pers nal pr ductivity information. Therefore, these function from NESC to the newly because of the reduction in established Energy Science and systems must never be used for "teleplume tag?'

storing (even temporarily) or Technology Sofhare Cemer (ESTSC) at DOE's Office of Similar to the IBM 5520 Network, processing such classified information. Consistent with NRC Scientific and Technical Information e-mail also allows usets to flag a (OSTI)in Oak Ridge,TN. 'the message as priority mail to call it to policies, sensitive unclassitied change consolidated D0E scientific the immediate attention of the inf tmation (~ t, penonal data, and technical infonnation recipient. E-mail users can distnbute propnetary data, or data that have a management actmties at one messages to individuals, groups of high potential for financial loss),

location.

users, or everyone on their LAN.

Official Use Only, and Safeguards One can send carbon copies and data should only be entered in (or ESTSC tests, packages, maintains, attached to) an e-mail message updates, distributes, and archives a I M cop es other ums and library of NRC NUREG-documented request a return receipt as is done where expressly authorized by the p licies of an NRC component.

with hard-copy memos-computer software submitted to it by NRC staff and NRC contractors.

E mail has nnother useful function Generally e-mail system secunty Submitted software is screened for for the NRC workplace. As LANs features are placed in ths : mtext of completeness and readability of are bridged together, one will be able commur,ications security, tuich may computer media, and test problems to use e-mail to send files to users on include encrypting or scrambling are compiled and executed to ensure other LANs. For example, a user on message uansmissions to prevent unauthonzed access. Threats to that they can be implemented as the Phillips Building LAN will be individual privacy are increased with desenbed in the associated NUREG.

able to use e-mail to send n the widespread introduction of ESTSC auists sot 1 ware recipients in Wordperfect or Lotus file to a user mstalling and using NRC software, on a LAN in White Flint.

c mputer technoh>gy. When a and notifies them of corrections, computer is connected to a network, revisions, and replacement releases Because many people will use e-mail the information stored on the as they are processed. ESTSC also to communicate information (conirnued en page 3, &cunty~)

ITS NEWS Page 7

ese-,wa /*>

Local Arn Network o" """*' "

  • d* ' ""'"' d network computer by an irdwidual anultiple urr arplMons, Such may weane acana,ie to od> cts.

(LAN) Data Base afinaumaa ew')*a"*

  • and individual control over this network to share informathm while, access may be hmited. for example, Applications ai oc sune ume, Pro'idins ><curity some avpota6ons have begun to By GeraldK Tomhn. lkM<RES U """" I" * *
  • etutintre their employees' e-mail to determire ifit is being sent for Sane of the LAN lmd RES gg3

,,,ggy business purposes only. All for the past 4 or 5 years, tie Office canmercial e mail applicatims of Nuclear Sgulatcry Rewarch Hescarch Project Mansgement male mme povishvis for security, (RES)has wen using several Informotion Splemt Tius system but recuritylevels available amcog database applications m its loeJ contains descriptions of active RES c-mail packages vary widely. These area atwork (LAN). The RES staff projecu. Typicalinfonnation features generally include passwad uses these applicatleas to maintain consists of a project's tale, RES necess. Tct MJihonal protection, infonnatlu on subjeus such as project manager, contractor, budget, mest. ages can le encryped upon research project desedpdons, sratus objecthe, status, research transmision, ard stored in an of acthm items, foreign travel.

c<anplewd, plarmed research, encrypted form to prevent internatforal emtacts, RES stafr delhrrables, significant fmdings, unauthorized access, room and phone numbers, ard regulatory applications. The management and printing of contract system is currently undergoing An article in the November 1991 data, ard fonns generation.

extensive mcairications' issue of ONLINE entined, " Putting Out the Flames: the Etiquette of Law The applicatkms were developed Action Tr acking Managemcnt ard E Maul," ofirrri the thought mg a personal cornputer (PCF Information System: Tracking that,"The (Husko of piracy with based relational database software methm items (such as those from pawwords andlogon procedures may pK'ae, Pardox 3.5. This WITS, or FOIAs) assigned to RES delude some e-mail urers into scfb.w, fourd on many NRC PCs is tie function of this syrtem.

thinking they have rights they do not ard some networks, has progen easy T3pically there are 80 to 90 items leave." 1he article mncluded by tw beginners to use. It also provides octhe at any one hme ard, at saying,"Despite the illusion of sophisticated ard extrasive pitsent,1500 closed items in the prh acy, e-mail is anything but capabilities which include an system. Infc mation in the system confidential Remember that your e-apph:ation language for application is maintaired by the System mailis an extension of anu a developers. One ofits rnany virtues Administrator; Anita Summerour, reflection of you." e is that it runs wry well on networks and can be refened to t:y anyone on the LAN.

Foreign Travel: RES maff trawls Controlling NIH ComputerTimesharing Costs ahmM mme ihan mafr rmm any ByHerbertM Parcover,IRM O'! NRC Ofli'* Wh** YES *'*II initiate tid plans for foreign travel, There are several easy ways to management asusce from each Mmey can also be saved by storing RES diviske enter th we piac at reduce costs wtan you or your data seu m NRr' pdvase packs (i.e.,

their LAN connected Y. The office are usinne National NRC001 through NRC004)instead of System Adminiarator,Lyelyn Institutes of Ilealth (Nill) computer public packs (i.e. Tile 01 through Gregory, then uses tle system to system. The peatest savings (60%)

Fik99L $1mply nsave your data sets send data on all RES plarmed travel can be realir.ed by running print on NRC packs, verify the new to the EDO for the required and/or batch jobs during discount location, and then scratch the more approval and processing.

periods. The discount periods are opensive public pack garage. Also, betweem 5:00 p.m. and 8:00 a m.

scratch unneeded data sets and all Foreign Contacts: This s>wm Eastr,rn Standard Time during the migrated data that are of no further omtains a fining of neady 500 week and at any tirne during the use. Where possible, move data to intemational cmtacts doing twiness weekend. To have your batch run your personal computer (PC).

with RES in 132 organizaticau and automatically during the next 176 krations in 34 countries. the discount pericd, use the lig Imtly, eliminate all Nili access System Administrator,Evelyn command " DISCOUNT" of use initials that are newt used, by Gregory, maintains the infonnatico the "/'DISCOUtG" statement submitting an NRC form 380 to fa all RES LAN users.

After the job Statement, lierbert Parcover, MNIE7602. m romuwson ge 9, wn/~)

ITSNEWS Page 8

(*NIH"pom pge 8) f(Qgl C ~~~

ricetronic Phontimuk: As its name pgg,,4.y;ggg, jgy lmplies, this is a listing of RES staff phone numbers, twwn numters, and

/n Al(/norlatti orgardzatiorud compments. We

'lla los Alamos Vulnerabdity an t firnetAlurrgyllofffffr System Administrator is Jeff Risk Assessnent (l.AVA) software is Wolman.

being used at the NRC by the Co&s and Stardards Sectim stalt for Contracts runding: Urd by tie mart evalding wcurity of NRC empter l

f 11rar h, n qu 1 e ates r r nan threats.

Computer Scientbt the luckage of dwurnents necreary to As active w,crs of LAVA, two NRC tmrofer furds to DOE laissatories and U.S. Navy Rear Admiral, employees prUciple in Oc other canractors fir RES pnjects I edermed LAVA of Washington Retired Ve System A&ninigrata is htyy tre (FLOW) Us,er Group. he group held O' "

its first meeting at the NRC White Using Para &o and its appliccion flint Duilding in July 1991 with 12 Many NRC staff were privileged language, stand alone or network people in auend.mu fmni 8 to hear this courageous, brilliant, applications like the ones listed agencies De <cond meeting was and tinids Navy Admiral speak alvve can te quickly and easily held in cupuncum with de meeung at the Women's llistory Month developed fi>r other NRC of the National LAVA User Oniup at celebration at the Crowme Plata organirations. Similar Parados de Nmal Computer Security in March of 1989. In be C""If'ence Omni.Shoreham lkitel, lifetime Adm. Ilopper won applications are now operating in the Office of the inspector General Washingtm, D.C., in Octoler 1991.

many Navy awards, and lu 1991 (010)and in the Ollica of Den were seven stealers, two imm she received the National Medal Infonnation Resources Management NRC. Emily Robimor., co chair for of Technology frorn President (gggy FLOW, reported on the local group, ilush She was a sciendst, luid Data OadW gave a talk entitled teacher, and (hallenger, Ta furtler it firmation u a "Enferiencing the LAVA Process."

demongration ofeximing applicaiom, in March, the local group plans to At the time of her retirement, the ccotact Gerry Tm im in RLS on 492 meet at the Interngency OPSEC Navy Secretary said, "She has M03 orITS492 3603, a Sulpyt StafTluildir,g in Orecidelt, u challenged at every urn the dictates of mindless bureaueracy," She was a creative force in the building of Artificial Intelligence User Group

"* 't ^'r' 5c' ' di i'*

8 computer, the MARK I, and By /nlie E lancaser, AES subuquent MARK versions, as well as the UNIVAC 1. She De NRC Artificialintelligence Knowledge Engineers, who spoke o created the initial design of the User Group (AIUG) met at t!e NRC the role of the knowledge engineer in COBOL language, and White Flint building on Novemter artificialintelligence problems Dr-developed many new software 19,1991. De speaker was Russell J.

White can te reached at 770-4621.

tools, lier sense of humor was Davis from the Planning Research delightful, and she loved to tell Corporation.

NRC is planning to sponsor artificial die story about debugging the mielligence training courses and M ARK 1...when the first " bug" lie gole on " Peeling the Viral needs the support of the uset group.

was literally a 2 inch moth that Cun" which dealt with computer if you have any suggestions or died in the circuitry, virvees and expert systems. Mr.

questions regarding these training Davis is very knowledgeable about courses, plear.e wntact Carolyn Adm. Ilopper was one of d -

computer viruses, lie can be reached Dassm on 492 8526 or FTS 492 great contributors to twentieth at (202)453 9021.

B$26' century knowledge, and will be De group met again at White Flint ifyou wwld hLe tojoin ARIO, nbtain impossible io replatel on January 14,1992. he speaker moreinfirmarim,orhne any was Dr. Milton White, Chairman, questions, plese callits Lancater cm j

k j

International Association of 492 3969 ce FTS 492 3960 a ITS NEWS Page 9 i

i f

_=._ _s=

n.

ma ss

==

=

-m-man um m

B Bull 8 NUCLEAR DOCUMENTS Rum WE W IEF W W W SYSTEM NEWSLt: 1 I t-R The NUDOCS/AD User Suggestion Box NUDOCS'AD User Support denices arxl press the EN!Ellkey. The Priority: The Priority L de is a answers questions for all NUDOC S/

curs.or will move to the Subject Geld numerie value between i and 9 that AD users Tie On Lir e User indicates the priority level of Oie Suggestion Ilox is just one of the Subjnt: Type a short desenption to suggestion A pnonty value of "I" rnany t.cryices administered by this identary your sugTestion aid press represents the highest prkirity. A group. The suggestion flox gives the ENTEft Ley. The (unor will priomy value of "9" represents the users of NUDOCS/AD tne move to the Phone Number Geld.

lowest priority. The default prionty opporturuty to express opinions aslS d

value is "$."

p voice concerns about the NUlXX AD system, to ask qnestions, or to ph rie number and press the ENTEll The Primty code rnay be chanyed share NUDOCS related information key. Tle cursor will move to the by typing over the default ecde of with other users.

N nty neld "5 " Press the IWIEtt Ley wben Date: The cunent date is

""' Y " # " "

"" M "" "'

automatically provided by the Access SW'* ' 'N *"f " '#C'"58'y in Status: The status code is assigned this Geld.

gamunu,4 on page y, w ?tay, To access the Suggestion Ilox, uw the Tall key at the NUDOCS/AD Main Menu to gusition the cursor next to " User Suggestions " Press l "NUMAD>>

h hM Gwi WMD the ENTEllLey. (See figure 1) r== Con 23

-- NUDOCS'AD. M.us Mau SCARCH DOMAIN USER INFORMATION l

The On.Line User o Enw. Document a user suggeiuon l

Suggestion Box Screen D' tab

o Prob 4m ust o High Level Waste

  • 0"O"' nom The Suggestion flox screen is
n. posit ory divided into three areas as shown in

,g b E" 1 Correspondence MISCEL1 ANEOUS o Licensee Event o set Defaults Reports o Data Download The Identification Area o s,3,oow se,nng

'"'

  • T" The top area of the screen is used to identify suggestions and their authers. Reids in the identi6 cation area include; use the TAB key to change Categones. Up/Down Arrows to select,then Pr ess ENTER.

Swch agmst all documents.

Namet When the Suggestion 130s is Char Mode. Rephce Page !

Count >0

---d acceswd, the cursor will be kicated at the Name 6 eld. Type your n:une Figurei ITS NEWS pqe 10

a fWl*A 7.A*'/*se 10 the TAB Ley to mose the narcar to resrIne has teen critten ar>l by the NUDOCS/AD User Suppwt the Update fic'1 Prer,s the ENTER approved by the Document Control Servi *es Group. !!his code indicates key to submit the completed 11 ranch,the Status Code is chtnged ti.e cunent status of the suggestion suggestion.

to a "C" and the final resporte is entered in the Suggestion Box.

are can uly be changed by pins WApE m nu de NUDOCS/AD User Support Suggesu u a a r submhung a Adions taken in reenw b Services. The following status codes surgesu m suggntions enay inchide the are currently in use:

submittal of; N. New entry

  • Problem Reports R. Us. der review Discrepancy Reports The Response Area e

P. In process ofimplementation or Enhancement Requests resolution The rnponw aten displays replies to Requests for Additiotal C. Completed or resolved suggntions that have been teviewed In'onnationReferrals to the

{

by NUDOCS/AD User Supput A rc riate Or'antration I

Press ENTERTo Updatd ): Used Services and the Document for submitting a suggesthm*

Management Branch,IRM. nis Kha suggesaken are citler regtests ks hren enny aho te scrolled. User caneaims waitansnents e de 4

Support Services persormel check the sysem. Requess Rr nrrectkus kjent ry The suggestion Area Sugtnua Box daHy e detennine if ptA4 cms withextaing adaa nny new enuies have been made+

pucedures. 'Hw dems are tas11y 1

a

'De :margestion es is tuod for enterina soldin a n hahelydKrt time.

details of the suggestke. This field M, hen a suggntion is entered, Requas fa ailwxements are uwally mayle suolled to allow erusigh slece NUDOCS personnel change the d i did&

rw ca.nplete descriptions.

Status Code to an R indicating c

NRC,suggestkan of this nature are that the respont.e is under review.

Dd Type the first line of the suggestkin, An Interim response acknowledging i

press the ENTER key to move to the the suggotion is entered in the second line in the suggestion area.

terronse area. The submitter is At the end of each line continue to called to a: knowledge receipt of die press the ENTER key until die

- suggestion and request additional List of Suggestions suggestion is complete.Tien press clarification,if necessary. When a g

review by NUDOCS/AD users.

While at the Suggestion Box, pess

)

"iJUDOCS/AD3 Nutine RacAtuy Camvern Vwiian 002. Y10 F2 to display a listing of all cutrent suggestions. To read an entire 1 alknik*

suggestion and response, position 4t the cureor next to a suggestion by m

using the DOWN ARROW key N"'"*'~~"

and press the ENTER br,' The entire suggestion willle 9 played.

[:

Pmnry........ i s Ome --,--.. : Is-NOMI kaus:....... a N Preu LNTERto U@ne()

p jg current suggestions.

~

Suggetkin Suggestions remain on 11ne for two weeks after a final response is displayed. The User Support Services Group ensures that the author of every suggestion is me NUDOC1'AD. Regowe contacted and informed of the resolution to his/her suggestion. If -

you have any questions about the ErwarYour Nema, FMht Sugesuons, Fl.lleip F).New Qwy.

Suggestion Box or any other ChvMods Rar ceheel Coune

  • 0 feature of NUDOCS/AD, contact e

the NUDOCS Ilotline.492-8603 or Figure 2 ITS 492 8603 m ITSNEWS Page i1 s

,w-.

ms-,e..

-w,-,--emm m-w,~,

-e,--w,,,--a,-w---,,m~r,---,e,,,...a,m

--~,ew--.ww,-

.~m,-

a.cnv-mew n...,-m-e-

,v r

w,-,,ewm-

SIGN ON 3__

y i I r1 w

sus e ammmmms Two New SINET Systems Coming On-Line in Early 1992 Integrated Events System (IEVENTS)

The integrated Events System

,[-

M,~ ;

J (1EVIMS), scheduled for

.t implementation into $1 NET in H e***

February 1992, represents a

'^~

cooperathe eIfort between AEOD, L'h' I,

NRR's Events Analysis Ilranch

'**d' #~

(EAB), and IRM. The major goal 4....m.nt e ofiEVENTS is to tie together all g

L

,,,,,g, the information about each event, i

no that a broad, inclusive profile J

-J y

r 4

esists detailing the technical and M *' '"'"**' N e.e, udministrative history of the event.

r.u. u,,*, npi.

,8 'lj'y 3

AEOD (using its Operations Center 1-local area network (l.ANJ) has r'

~ ! ! ";

developed a data collection l ** =

J~

mechanism for gathering event

~

~'

notifications (ens), preliminary Figure 1: Integrated Esents-Proccis Model(Conceptual 1 cul) notifications (PNs), and daily reports (sometimes tefened to as momitig reports). These data will be made available to SINET. Other are already collected and passed to of the data gathered by ALOD, as well as SINET (rigure 1).

mtrh (kaa rumrdly collected in SINET.

data in addition to these textual EAD generates cianrierizations ofcach descriptions are also collected at EAll has developn! a IGlard ewnts ewnt arxl relemes tle to olla NRC this time.1.icensec Event Reports assemment systern (to help the tranch offices. Much of the (Lua currently (1.ERs), the final reporting stage, gnpve itsevahutim)ttat capurts avne collected by SINET is imxd to the ewntswessmentsystemsian(bankud inewiure performa!cm demand by FAlt.

The SINET events database serves l

SHARED as a mediusa of exchange between these systems,,wtoviding the agency i

l with a centralized, organizing repository where data are placed for all ofnces to use.

ne major feature:ofIEVENTS are: (1) collecting and distributing i

'f' -

N N

as many types of event reports as possible,(2) linking (w herever

._,m practical) difTerent reports INFORMATION NETWORK d'5cribi"8 th' Sam e c'e"' "ad (')

an easy means of performing on.

(ConunucJ vr page 13, *SINW)

ITSNEWS Page 12

Floppies Safe Ikwnher JA i991, fu 4, No. 3, y

-1 Rll S RTIM4GE

(

$hl E rh.~

  • g g g.i., h. N[

The effects oflow !crel mu ml @HF.B loniring radiation and gj ]

ah* a ei a-magnetic fields such as those I

1 L

found in airport x ray usu a@* ~

L g fy }

{

I(ltillEU Corporate l' machines and metal detectors i

have been proven not to affect j-u

]

gtiggqq..

Database floppy computer disks, r

g[g$;.C l L

according to a presentation at a

[ Radiological Society of North America] RSNA.

1 amar L

/,ANSl,

L Lf "We innd no changen NIH MAINFflAME whatsoever from the exposure gg6 ~~'i__

.l m, y m.Agli

-~

y-. m j* *!

to the x rays or changes to the magnetic fields until we got figure 2: Enforcement Action Tracking S stern up to 1,000 gauss," said co-3 Conceptual System Model author Joel E. Oray, phD,

&fessor of Radiologleal

%y

Mayo Clinir, Xrci or, MN, at the (NA7T',M /wgr 1.')

EATS enables management w Pd'dOD-(1) schedule work within the omcc, line r,carches and retrievals, and of (2) derive satisticM information in the study, researchers generating bardcopy reports impunt to die enforcement caposed nn mal 3.5 inch ifyou haw questicos anceming the pmcess,(3) generate reports that floppy disks to varying levels (Negrated Everns Symem,please call allow enfwecment specialists to of M xdays ad magnede Garrie Wilhams on 492-5029 cr FTS mm4w de pmgress of enfacement nam N x rap ranged 492 5029,cr Wil Malisce cn 492-acti n cases, and (4) use repats from from 100 to 1000 rad, one 7781 or FTS 492 7781' de system fw ownmary infamation, mMn enes & men $ M a some of which get reported at the normal one millirad airport u.

Commission level.

tny machine. N tmal exposure to humans Enforcement Action Initially, appmximately 12 people in throughout 1 year is 120 rad.

deleak uarters Officc of N change was found in the l

Tracking System Enfwcement and 8 regional disks.

De Office of Enforcement (OE) enforcement cardinattes willhave requested that IRM convert the-acces to the corporate EATS. Access The magnetic tesi field was existing Enforcement Action to the system is subjcct to ressrictions from 10 to 1,000 gaurs, and Tracking System (EATS) fmm a PC.

placed upon data acces by the Omce there was no effect until based envimnment to the caporate of Enfurcement, if you have questicus higher dosage was applied, environment (SINET). His request anceming EATS,please callMargie and as eapected, the contents is based on the need for regional Dimig on 492 7417 cr FTS 492-7047, of the disks were crased.

access to enforcement acticusin w Wil M*lis;n on 492 7781 or FTS Airport metal detectors range

^

order to more unifonnly determine

- 492-7781 a from I to 3 gauss, a violations and rieveritylevels.

Additionally, an interface with the SINET laspection Follow up System Do you have an (IFS) allows inspectors and other i

idea for an Co authors of a scient(/lc f

regionalIFS users to track escalated exhibit on the topic presented -

g enforcement items. EATS is s

by Dr. Gray during the RSNA call and let us know -

scheduled for implementatlon into 492 830, meeting are J. Tabel. RT, and SINETin January 1992 (Figure 2).

L Cesar, RT.

ITS NEWS Page 13 u

5"3"O TRAINING m7 LAB NEWS Exploring the ITSTraining Laboratory Consider some or the cesigning The Training o,, mn a,, g<ts,,,o accu,r reasons for coming Experience inaccuracies ma midamg io training at the ITS statements The exercises are Adult education is an area tiuit is keystrotal to make sure ont every step Training Laboratery.

raphuy gauung pmininence are is calln!out and peche direcska (Check as many as apply.)

stature. Experience has shown that gnen O The come it related to my actively promotmp training in e

FmaUy,a pkt of the coune is rnothauonal and production bawd pesentext 1he mdience for a pikit job requirements.

subjects results in better Joo incids dw irdivianis widow O The course is designed to petformance and improved morale.

the objecthrs and are acquainted with meet my objectives while Central to the issue is tie oftware, as well as "real student keeping me away from my testers " "Ihis group evaluta the job the minimum amount of

  • Who should be taught?

cm hm de m's standonnt, hmt

  • Wlot information should be offering a different nid imputant included?

lerspective in this instructioru! design O The classes are small and it is P"#

easy to learn, there's time for

  • llow simuld the material be indhidual assistance.

presented?

Afler final resisions, the courw is raheduled for op n registration.

O Training offers an opportunity

  • Should job akis be included?

Shoukitie materials te specific to a to add to my professional

. Wlot means are there to measure tuttower audience, the course is development.

9,e effectiveness of the training?

scheduled for the specific group widiin de Agency eat wW tenent anot O The courses are interesting and the instructors are well At tie ITS Training latxratory, wien Throughout the training developmeut versed in the materials.

a subject has teen identified as a and in each of the course presentations, possible training target, a systematic instructors will refer to those atteriding O 1 heard the classes were really a;proach to instructional devekpment tie class as "puuripants " There is filled up and it was s taen Tie goalis always to design good cause for tiot distinction. Adult sometimes hard to get in, so I courses that will ensure maximum leaners are more than "stidents."

decided there must be some learning, retention, ard npplication to Each irdnidual brings rfecial good things happening there.

spectfic NRC needs. First, a needs knowledge ard experierice to class to analysis is perfonned Irdniltals are enhance and broaden de understarding O I like the reference materials intemewed to identify what data tley of all others atterding. The interaction in the mamals that are FMow they want to use it, and wint in tie classroivn of shared unique provided when takmg court.es erd.pndwts they are anticipating. A experiences aid in tie instructiotal at the ITS Lab.

detennination of do will be required process Tie actiw interchange of to km and u*,e um sonware is mak ideas a:W concert 6 letp other C Everyone gets their own PC to work with so we can try Second, a course bluepnnt is dewtoped out all the features.

to include the features that will meet e NRC's specific objecues p&nufed in the needs analysis-Class (Structured)

O I am motivated to leam as Education vs.

much as possible; the ITS Lab 11 ands on exercises are devekredio individualized Learning m es it easy to gain gnat provkie expenenttalleanung Cour',e Experience 5.

knowledge.

coraent unnen to suppon the exerdses ard ponde after class An alternative to the interactive, If >uu checkcxl fewer dan four of reaffirmati n f the procedures _

structured circumstances of the ITS the alme,)ou mut visit the ITS lab scxuf T1urd, tle course materials are read by irdniduals thoroughly familiar with (Cononud ow /5 "#P)

IlSNEWS Pqe 14

(nYn e w.lf m/ w H>

directories are different, alter your new wnndary file this will be cantnand tires accordingly.

written to the WordPetfcct d*'"*' "'"

Lab is the cornputer-based training in dBASE, type tie following available at the ladividualized cantuands, itemsin bracLets [] are

'the Convert hienu will display.

Leaming Center (ILC). Self study to be supphed by you.

  • type 9 m wlnt html hinge through the use of interactive courses

, pgg g,g,47) is the solution fit many who are At the field separator prompt, unable or unwilling to give up a day

  • Identify the fields in the database t)T'e a comma [.)

to train at tic lah This new that you want to import into At de inad pior pmm4 e

appmach olTers individuals an WadPerfect.

type 13 and 10 sunourded with ogprtunity to train at their own pace

  • IMn pr de k swt by de braces ((13)(10)). 'Ihis and in the privacy of their own work duird ne h represents the ASCll characters area. Skiltful, tested trainingin for a canier return ard a line many packagd sonware and
  • At die dot prutnpt, tyg the feed' techriical applications is available for following command. ([sp]

those irdividuals. Call the ILC (492-means leave a space.

  • At tic cintacteri tale deleted 4514) for a copy of the computer-

[ filename.sdf)is the ternporary prompt, type a quotaton mark (")

based training malog. a file that will contain your data untilit is converted into a W conven pmpn will create a WwdPerfect secoMary file).

secordary merge file that can be used with hiERGE to create COPY lsp) TO Isp]iWP$li persmali ed letters, lists, labels, nnd Revised Method for Imamme.sdfi twi riEtim ispi other documents. The finai ronn ihe (List field names separated by data would take would depeixi on the importing Data from c=mmiImlimLmirrED primary nie aesigned ror the merce.

dBASE

^"""*P

COPY (sp) TO (sp)iWP5l\\ list sdf delimited nie used as an example Wordperfect twinELDS[sp)iasi, firsi, maiisiop, g,gd'g"A""d phmie[n]DEmWG in the tevision of the Wordperfect Wordperfect 5.1 as expressed telow; courses taught at the ITS LAB, new Tie resulting me wG have aH of de Perez (End Fieldi materials and exercises were added.

fields surmunded by quotation marks htaria(End Field}

In tie " Wordperfect Enhanced

(")and separated by commas. Each IF22 {End Ficid)

Documents" (hiD) course, the record will end with a hard return 570-121$ {End Record) method for importing data from and the data in the temporary file Peu (EM Fidd) dBASE to Wordperfect was willlo k like this:

Sm (EM Fiddl redefined, if you have taken the "Perez","htaria","l F22',"$70-W306 (End Fieldi

" Enhanced Documents" class and 1215' 492-4920 {End Record}

are comfonable with the merge

" Peters"," Sam","W306","492-(in 5.0, the fields would end with the feature in Wordperfect,tle ITS 4920'

,R code and the record with ^E.)

You have canpleted all you need to e f I owing t od o in or pg

.the order that the fields sorted and selected information from doin dBASE were copied from your dilASE file is dBASE into Wordperfect.

  • QUIT the same order they will be numbered in tie secondary file.

For the purposes of this article, the

- At the DOS prompt, type:

following paths are assumed to exist As in the exani le above, the order C ispl\\

an on your computer.

f the field nr.aes in dBASE w'll p

di Your database file is assumed to where the CONVERT.EXE file exist on \\dBASE.

resides)

Your Wordperfect progrnm files Type: CONVERT (sp]

are assumed to exist on \\WP51

\\WP51\\[ filename.sdf)(@)

hiailstop Field 3 Your Wordperfect documents are

\\WP51\\WPDOCS\\[\\newfile)

Phone Field 4 f#

\\W l\\%

S n e teate Af

  1. '.f "' "

3, '

  1. f#

If your dBASE directory and WP

"\\WP51\\WPDOCS\\newfile" is the numbers in Wordperfect. s ITS NiiWS Poe 15

TECH

~

m NOTES t he entwo of the ec eter pmW thw emi e tase rnemory(also called AllIllM IC aid annpatible sptems inhownlinsorannoe ertuume s.Nuc naiventionsl) can genente i Mb of taw memcay.

Q Q,[",',{*[$"'

e exterded memmy Toobtain t!e sunourd ofluse memay cewasmae ne man cewmithe na at

  • expanded enemmy required by an appbcalim, Memcry n

cowert sur PcendNillmen s sso44ano Marmgemerit Software can be installed

..J ser to senua.s 4e244*l Yee ney ei.e The diagram below i'lustrates ther,e his software tempranly mows trop 1 smhi.e la ow m 3 et2.

9 ohmory. He diagram resident ptcyrams wt of the M0 Kb includes cxamples of sioftware Oct twe memtry to an wea above it are und wWn each type of Ormni, utenM, a upmM m Personal Computers

memory, ttat more of the M0 Kb twe memcey is available for pnmeng.

Wanted: More Memory Base Memory llow memory is used in your system Mcet perwnal computers today use a deperds on the interaction ofi tre base memory of up to 1 megabyte by Mw4 factom (Mb), which is the maxirnum amount Exterded menwvy, the lewl atow the f base mem ry possible. Of this i baw I Mb,is an ailhtional 15 Mb to 4 e type of memory Mb,640 kilobytes (Kb) are reserved gigabytes (Gb)of memory that is e application prognun requirements f(v the disk operating system (DOS),

dirwtly accessible by a asnputer's hardware or software required to appucaten pmgrams, and device micropocerus (deperding on the e

drivers. De remaining 384 Kb are goccav). Directly accessble means provide needed memory refened to as high or reserved tie computer can generate the fairess memory. De reserved memory is (location) of needed data and files in

%e three types of memory ottainable used by the hardware installed in die

memory, on allIClased sysems are:

system.

Extended memmy is govided by hardware For ICs with less Omn 1 Mb of memory, a memory inard with hiemoty Typ_e Qsed fof exicided memay capabihtyis

(

required. Extended memory is tot l

available onIllM ard nunpanble ICs EXieilded

' ?b windows /388 w Us,which me an 8088 or 8086 e

microgocessor. T1e IllM XT/286, b

l.otus Release 3 AT, ard pS/2 Model 50, which use an Provided by Hardware 102 Kb OS/2 80286 gocessor, can address 16 Mb of memory ne PS/2 Models 70 and 80, which use an 80386 pmcessor,can access 4 Gb of memory.

L Reserved to2[Kb Expanded i Windows /200

"* I""* ' I" "O*"* ""'"Y

i or High Provided br a)

Ventura Publisher I

d<e io ine. seawd inmuction set 641 Kb SofIwere Wordperfect 6.1 made avmitble by the newer processors; e g.,808W8086 family processors have an 8 Int instruction t.et!

8 bit data path (8 bit processor); an Base 840ko DOS Programs 80286 processor has a 16 bit instruction set /16 bit data path (16 bit includes 0 b D0VICO DrlV0f 8 Reserve (Gmh urJ on page 17, "TecW')

ITSNEWS Page 16

('f W f w n pige 1 0 TwoGerciftware cilutkrocv All of the ctwne-mentioned factc7s processor), ard 80%W80486 family awuh gmWg exW ruun be Iaken inm emWerah pocessas have a 32 tat hetructim et nen g befm addmg mnery to ywr system. Marching a tyle of rnemory (32 bit pwemt ne 80M6DX/

EIM emulator for 50H6 e

to your acquirements povides the BM86 praesus unlite a 32 bit data systems, whic h allows estended best tetum on the time and money path.11e 80386SX poccuor uses tl*

memory to te simulated as linested in your tutraware and 8028616 bit data path, tsu is a true 32 expardd snemory Sonwa,c, bit tws"

  • LIMulator for 8088,8086,

$0286, and 60386 rnicroprocessors, which allows i

Expt.nded Memoty hard on.L space to be used as Shortcomings of a (provided by software):

'* F *i'd " " * 'Y-N*C Y)

Expanded memory provhles 32 Mb At some piint in time, jug atout every of memory and works in high Extended Versus Expanded urr willhave that raing feeling g

g y

memory. The micropoces.sor Mile this dacussion may nmke h g,y iggw4.g4 eannot generate an address for seem like expuxled memayis simply

,,pgt.,." cantmud was isud in software requiring espanded memory an e xtension of exterded nenury, it is t!e wrong duectory, or smne dmster without an Expanded Memory g ggg3,gg,ce m ygogglAII0f occurred caushig a nie to disappear. In Manager (EMM) EMM is a pur sycem's available exterxksi mruiy ca'a, diert u inpe. Ikcause of software canponent that is activated mcmory capacity tefure exparxkxl de way DOS rdares files, de d:aa is when the cunputer is turned ett memory can te a<kled. Expuded usuallyretrientble Recoverycan EMM maps small pieces of the memoryis an entirely different ard rtyuve stry sjecialized tools and available memory (16K at a time) bdegMesa entay lainstallation and ggmaggg into the address space of the system.

me 4, tu tely on exceedmg the ah WMNC Tmbd Each 16K piece of memory is called capacity of extended enemory.

a page, and the area of the system Mace Uttlities, that simphry the that receives the page is called a in addition, although extended or h WyW g

page frame, exparded memory increases the system,a memory capacity above the d@ hp EMM acts as a tmine directa tetween base I Mb, they are both hardware-seemer de canpkte &mneid.

DOS and expvded mernory,reservin8 deperxlent (as explained) and To understand why complete a page frame in high memay for software-dependent ne type of recovery is not always possible, it is access by tie pocessor. EMM tricks memory ta.d is also detennined by necessary to know how DOS DOS into thinking that the prtions of the software st', cations. For snaintains data on a disk. nree expar*d memory are part of the example, Windows /386, Lotus 12 3 main areas are used to store s".mble addremble memory.

Release 3,and OS/2 use extended infonnation atout a file; the Unfortunately, EMM requires time to memory; aid Ventura publisher,.

directory that contains the file name; move exparxicd memory requests m Windows /286, red Wordperfect 5.1 the File Allocation Table (FAT)that ard out of the page frame.

use expanded memory. Also, r,ome tracks the disk space location and Exparded meswy can te made appheadons canst a rider size used by a file; and the data area available on all ICs if there is at least 1 extended or exparded memory.

that stores the file's contents. When Mb of twc memory. In aitaticn, you save a file, its name and other exterded memory canle used as

"" P"'^* I" '""""d "" " " d'd *

  • in Summary cxpuded memory on tle IBM XT/

dhectory. The system searches the 286 AT, and pS'2 Model $0, tut an Confused? Normally, itis FAT for space to store the file and exparniedinemory board must be unimportant for you or the system to records the location and other irstalled De 80380 systems (IBM know the difference between base, information in the FAT, and then the PS'2 Models 70 are stolart aho exteixted, or expauled memory.

file is placed in the designated capable of ming exwixted memory as Your system will access the aren(s). A file may le spht into expanded memory, appropriate type of memory required several segments ami placed

~Es montWfNTRhes are by your applications; however, the wherever space is available. DOS extrxts funu ntmt muewf DOE's type of memory available, your stores a file in the first available AOSS Communique. Dwy are program needs,and the hardware and space, regardless of sire, if mae pubhshed wah the pemunion of software (such as EMM) installed.

Drcruta CaNmtt, Edster-all interact to assist in processing.

KMnud on page 14, '%Irmg)

ITS NEWS page 17

Ofemory"(nme Ps.17) utility program is used high tech riolutions potect against unsuccessfully (or improperly)to de anost significant low tech space is needed,it kioks for the nex!

rsstore files. Consequently, mw, of secunty pmblem: physical transfer free sprce, ud se on, tsail the tie information dat wwld have of media t>y human beings, known as comp. e file is stored. Owr time, as made recoveey emier can bt altered, "SneakerNet."

W you save, delete, and copy fdes, the ud subsequent recovery efforts are available areas bemme scattered, greatly hampered. In some cases, SrwakerNet exists everywhere and a file's storage areas are much data is irnvocably log. If your removable storage media (e g.,

less likely to te contiguous, software package automatically 00ppy 6Adus, tages, tem vable makes a backup copy you can did packs, and cartridges) are used.

Wien a file is deleted,the file name retrieve dat copy. Also,if you Each time you take a floppy diacite is deleted fann the directory, but tackup regular 1y, you may restore t an ther PC to use a better printer importard specificatiotu are key.

de Me kom a bukup didow' or a different software, you create a 11e entries in the FAT are cleared SrwakerNellink tetween those two However,ne der may contain your ard the area imed by the (de is freed; h m chang n PC svstes. Although SneakerNet is however,tfe data remains in the area often the most convenient, it wu mored if you tealize if you should ever realize that pu've trengensive, and flexible fwm of immediately that you accidentally los a file you need to stop wcak data transfer, it creates camputer and deleted a file,it is almost surely Immaediately. (Unfortunately,sorno physical security management retricvable. Ilowever,if you application packsges do not stop concems. Ev.rn birrple Src AerNet continue to use your system, immediately but continue to do some links between systems m the same subsequent r. aves mayoverwrite the nie operations.) If you use a utility ofnce can create security and data data (remember,the system reuses program, attempt tecovery only if lategrity problems tecause these heed space) or reuse tie directory you rnity know what you are doing, links are partleularly prone to user entry where the filename was kept.

Oderwise, contact the [lRM error. Introduction of the human This will complicate recovery.

Hetuee), which staffs personnel who factor presents numcrous hazards and are experienced in file recovery, substantial security riAs.

Wien you attempt to recover a file' ilowewr, you must he patient.

even if you immediately discover hry Wen a dremnsW Think about how often you rnove a your error, it may not le successfully effort,and you may have to wait high density 3.5" diActte. When full,each didetic can hold 300 restored. For example,Norton uses several days before your datt,is an algorithm to make the best restcred. If the data is important or single space pagesofword pmcessing kxt Ws Wghstmage esimate of de space where your fde the time to reenterit islong,it will was morce' and then puts thmic areas te worth the wait a capacity generates a great deal of together as the file. That estimate is potential los,s if your SneakerNet based on the condition of de system procedures are not up to par.

at the time you run Nation,not at the time you originally saved your file.

SneakerNet problems include:

These may te compromised of A disketic carelessly leilon a e

unequal elemends, and the resulting table is subject to envimnmental recovery may knk the segments of Ward sud a spilled mfTee' your file together differently than Tracking Down Troubles heapheysicaldama originally stored. Consequeidly, the with "SneakerNet" Have you ever set a diskeite larger the deleted file, the more down near an open can of soda likely the reconry will be or a full coffee mug?

Information transfer is an essential unsuccessful. Similarly, the more files you recover,the more likely part of today's computing

  • Worksations m either end of the that a single ermtin an early file mimames,t. It always involws recovery will propagate into more potendal riAs of sysum nowd ma@mnph urors,in later recoveries (for contamination frcan viral infection, Not cady does thislead to the instance,if the fint temvery data loss from media mishandling,or inability to access data from the accidentally uses an area really disclosure of sensidve information, transfer media, but it latroduces belonging to another file, which then Security coun2 measures-from

& MonaW oMamage M uses an area telonging to yet anoder stringent pmkedon policies and k mesa, data, Ware, a file, and so on).

guidelines to special software software as you anempt to applicatior>-have teen developed to communicate.

!t Another,more difficult problem in make a PC less vulnerable.

.ecovering a file occurs uhen a-Unfortunately, none of these (Catined on page 19 "Afrmory")

ITSNEWS page 18

e m.ry y. meto irchile tie following pecautims.

Videos cfINEL Symposium o hiediatrwafermidstintaduce Keep daertes in aggrtyvise

'lle Segscente 1991 sympositsn was virures into either orboth sys:tems antairers (e g, dustjxkets, dhased a:xtde NHC has nieo in the SreakerNet. Ifcit!ct didette containers, or carthwd as es of tie nire Leygenkers. Call s

PcrxmalCeputer (PC)is shipping fokiers)at de dea and

.94MO rl'Ili964-M90 mregtesta infeded, pu may trwafer the virus dtring trangort.

dieom kan.

to a didette, and tien to any

. hiaintain runmco diAnte system with which de didette maintenance poxdures during Tcecs Ano SnAksas!

cuneS in attact. PoStable dsa tra,u;fer. for example,do InA leaW "1urek: Vismos into Realey," Alan Kay, ksw or darnage willspead with diacttesin alad nutcenotile or

^M * " * '"'

ewrylocationinvohed in the expue dem to magnetic fiekts "Tnmt* le lijk PerforadM*

SreakerNet.

  • Protect nniia at de hides N,"'l;"[,"8(pf,Iny[,'[,"d'"*

d classification levelofdata stored i

e itemoving data' media from the on tiem. Contad nur

,'[*,,g',%$.""*" k'

ofD(e art'a expires it to Organization's secunty officer kr t=. charles cantor, tiot; llunan Genonw asnptrnire ard loss. hiedia, mcre infamsico on secunty N "'

egecially analididettes, can te meastres kr classifial materials.

intheTutoksi awuveschag,I*"

casily icst, molen,(t quickly y*,"g"I As soon as pwsitk after usais e

nu p.

cwied. Leaving tie ofHee -

asnpleted returninedia to its emittuunent also pats that media storage loemkm. e

' Q " $ $ 8'{. [ f," [ ""'

in paentially damaging situations, such as ceposure to teat,lida, ggigm*ja g99,7s."

.1 magnetic fickis, mishare, arWor inin..i

..I carriess hardling. Ifyou ewt inisplace n du.kette.ewn for a few

,,,, pg ina,r efibe lva6 nimioon io the minutes,the data could te North Pok d****'""'

f,$

New User ids

",tn'" N"' " l'"' """"*"

The INEL Supercarputing Center it "virio.1 Rutitw : Iwm the c cnte to e Lack of attertico e argstpriate begirming te assign ids that include

    • H**{ 3**6'"bl'*" 1***P "

h recurity measures during media digits,because they have more than relocatims,canbined with de 9,000 users Current ids will not te l

high witene of SreakerNet clanged, so those of you who have W(Z3rdS l

trarufers, increases tle likehhcod been INEL us,ers for along time will thatinfcsmation ecold te

al" "al initial damaged, lost or cangtwnied Mm Atanasoffis coraideraibymanyb unintentionally. 71e key to le de itsn:htofde ctrnpuHrindustry maintaining data secuntyis tote Ile doudd aiddreamedofadesice I

awwe ofde riis ard guard Manuals Avallable tesed mIhbhase's demes,sminga against incidents.

didialagguch,whm stat machues Although the CRAY commards dNiewn exist. Ore nigin,while SneakerNet is subject to the same (c8ide on line in hiANl*Er8 drhing fut aaosslows,he formutmed a maagement rules as peer lie mcun hardcopies of the CRAY User Guide new Wa andwas att to anweiwualize effective security solution for ard TRS(Tape Reservation System) an electude digital compuw. lie tuilt SneakerNet file transfer is the leata User Guide may tw obtained by apoksypein 1939, called de ABC expensive toimplement. This solution calling INEL Sciernific User asnpuw,whidiused(1)elecoms as centera m identificatice ard arnlysis of Services, ITS $83-9440, the ocenmunicutkms medium, (2) tsu:vy sternial poblems ard commm a rue mantesinmenry,(3)sisial calaalmons,r4(4)amemorydevice Wien contemplating a SneakerNet g g g y goofplg

' imgkasemibyawdenars e told de

. transfer, know security requirements plus cr minus stase. 'Ihis ptetsyre was ard system configurations at toth ends

'lle CRAY utility awfuis ekwe e de basis Rr de ENIACconpuw. In of tic retw(st;pactice stardard gerfmning tiesame fancticn as de 1990, AtanasoffwasImred by de wcristation protection procedures.

Cyte FILESET. Ifymliked due U.S.Canmerte Deputmost with de

tack Lp data before a trarsfer; and method of ftle mayemert to

.e hhlalofTedmokyy,de natica's pactice carein relocating media.

stcrape gace, try this. htAN puges will hidies swird bensowed by de Presiderv YourSneaterNet procedures diould giw ym de syrgas ard peticulars.

Eriedmokvicalacidewments. e ns.u.

.,4 m e,are..,no-m enom ITSNEws page 19 a

NUCLEAR REGULATORY COMMISSION Computer Services Directory ITS SUPPORT CENTER FACILITIES TRAINING LABORATORY FACILITY lastions:

l u stkin:

3rd thor, Woodruont Builling

'If,,

' g[gh"2O PhilJps Bulkling, Rm P 358 One White lilot North, JC 12 g,

4 7620 Norfolk Avenue 11555 Rockville hke Bethesda, MD 20814 Rockville, MD 20152 Phone: (I'T3) or (301)492-4744 Malhtop: W 306 Phone:

L.atiorstory llours: 7:30 a.in.

430 p m. M F (PT3) or (301) 492-4100 (301) 504 1353 Class llours: 830 a.m.

3:30 p m.

(175) or (301) 4924357 (IT$) 964 2353 Sertkn:

Center llours:

Three classrooms for formal ADP tralning providing

  • land +n' 130 a.m.

4.15 p.m. M-P instruction in the use of microcomputers and timesharing systems.

"I Note: The Training 1.aboratory is operated by the Oraduate Microcomputer assistance (Telephone & Walk-in),

School, USDA under centreet, arid maraged by the Office of Demonstrations ADP Technical 1ibrary, and ComputerNidco-Personnel, to provide training in end-user computing for the based Tutorials. NRC Project Officer, Ms. Phyllis Smkh(492-NRC staff. Technkel guktance is provided by IRM. NRC a098); maraged under contract by Mr. Lee Teylor, OFrations Project Marager, Carolyn Bassin; GS/USDA Training Manager, Managcr, Analytical & Research Technology,Inc.

Mary llotmea.

NRC END. USER COMPUTING SERVICES Microccanputerliardware/ Software Acquisition, Upgrades:

AtTIOS licipune $041517 Plean con'.act your local ADP Coordinator to initiate this action.

IRM 11 dEne: 492 4160 John Burton, P 530,492-4836 1.AN llotline: 492 4243 NUlX)CS Ilothne: 492 8603 Microcompputer, Word Itocew'.*, other ADP Relocatlos:

MNI:T llotEne: 4924222 Plene contact your local ADP Loordirator to initiate this action.

Beth DeWoody, P-508,492 4132 T'l" wave llelp Dukt 492 4666 Micsocwnputer liardware Installation and Maintalaeoce:

thta General Systems Ivobicmas Karen McDyea, P.500,49T8906 Judy $ccherman, P 600,492-9687 IILM 9370: Kay Moses,492-4167, Dave Barrow, P 600,492 8304 at port De P

,9 17 Word Proccuor Other ADP Malatainence:

IBM PROl&T-MailSupport: $haron Root,3C-12,504 2256 Pleue contact your local ADP Coordinator to initiate this action.

I:lectronics Recor de Support:

Beth DeWoody, P-508,492 4632 Brenda $belton, MNDB-7714,492 8132 Modern and Ikta line Problems: P 810,492-4666 Automated Graphics Support Al Blunt,20-40,304 2216 Modeio and Ikta Lloe Acquisitiont Stan Wood, P-616,492 7723 Commercial Database Support: Elleen Chea, P-160,492 8501 Computer Roosa: Phillips 492 7713 Scientific Code Distribution: Sharon Root. 3C 12,504 2256 White Flint 504 2815 Shared Information Network (SINET) Devek>pment:

Computer Securityt Wil Muliaon, P Il0B,492 7781 louis Grosman, MNBB 7602,492 5019 EXilS: John Beatty, P-712,492-4164 Timesharing Access / ids:

Systeua Devekipment and Modification lierb Parcover, MNDD-7602,4921699 Ddi Unitton, P-712,492-8322 AtTIOS Program: James Schaeffer, P 532,492 9832 Dick llartfield, P-712,492 4328 Data General and INEl. User Support:

ScheduEng for ITS Training I.aboratory Emily Robinson,3C 14,504 3490 Eduardo Cunningham, W.306,492 4744 1 ; r 5 y l y o t i.1 i lentv u; yr,C-OST' Post this olv rnia t m L1"S7i V W

Ice, T r t - 0 0r - 9t a r r, l

f.99T i

'*. } f j I, T I k h.,

I

- - _ _