Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Computer software security

Mathematical models require computation to secure concrete predictions. Successes in relatively simple cases spurs interest in more complex situations. Somewhat specialized computer hardware and software have emerged in response to these demands. Examples are the high-end processors with vector architecture, such as the Cray series, the CDC Cyber 205, and the recently announced IBM 3090 with vector attachment. When a computation can effectively utilize vector architecture, such machines will out-perform even the most powerful conventional scalar machine by a substantial margin. Such performance has given rise to the term supercomputer. ... [Pg.237]

Computer use - including procedures for data generation, validation of software, security, etc. [Pg.53]

Keromytis, A.D. Characterizing self-heahng software systems. In Proceedings of the 4th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS) (2007)... [Pg.141]

Stopping Stuxnet-style attacks against industrial control and automation systems requires special attention. Antivirus software will not stop new Stuxnet-style malware, because it looks like legitimate application software. Also, security patches do not normally get deployed quickly into industrial control systems. Software updates may take years to get installed this compares to domestic or business computers where security patches may be installed almost immediately they are available. [Pg.46]

Akerberg, J., Bjorkman, M. Exploring security in profinet io. 33rd Annual IEEE International Computer Software and Applications Conference (2009) (in press)... [Pg.80]

Unclassified Computer Security Program Scientific and Technical Computer Software Hazardous Material Packaging for Transport -Administrative Procedures... [Pg.75]

The hardware and software used to implement LIMS systems must be vahdated. Computers and networks need to be examined for potential impact of component failure on LIMS data. Security concerns regarding control of access to LIMS information must be addressed. Software, operating systems, and database management systems used in the implementation of LIMS systems must be vahdated to protect against data cormption and loss. Mechanisms for fault-tolerant operation and LIMS data backup and restoration should be documented and tested. One approach to vahdation of LIMS hardware and software is to choose vendors whose products are precertified however, the ultimate responsibihty for vahdation remains with the user. Vahdating the LIMS system s operation involves a substantial amount of work, and an adequate vahdation infrastmcture is a prerequisite for the constmction of a dependable and flexible LIMS system. [Pg.518]

Does the computer room have limited access (e.g., are the servers physically/ logically secure) 2. Are there provisions for power backup 3. Is there a disaster recovery plan and is it periodically tested 4. Is there environmental monitoring 5. Are there off-site back-up facilities for key documents and software Is it readily retrievable ... [Pg.1044]

The programming staff or IT department personnel should develop a software/computer system design description based upon the requirements document. This description should outline the specifics required in the system, including security... [Pg.1056]

Firewalls may be a piece of hardware, a software program, or an appliance card that contains both. Advanced features that can be incorporated into firewalls allow for the tracking of attempts to log on to the local area network system. For example, a report of successful and unsuccessful log-on attempts may be generated for the computer specialist to analyze. For systems with mobile users, firewalls allow remote access to the private network by the use of secure log-on procedures... [Pg.209]

Specific guidelines for laboratory information systems include regulahons for computer conhgurahon, procedure manuals, system security, data entry/reports/ retrieval, hardware and software, and system maintenance. [Pg.407]

Reinmann BC, Warren AD. User-oriented criteria for the selection of Dds software. Commun ACM 28 (2) 166-179, Feb. 1985. Report evaluates lab-safety trends. R and D 37.12 13, 1995. Romano CA. Privacy, confidentiality, and security of computerized systems The nursing responsibility. Computers Nurs 99-104, May/June 1987. [Pg.242]

Access to electronic records should be restricted and monitored by the system s software through its log-on requirements, security procedures, and audit trail records. The electronic records must not be altered, browsed, queried, or reported by external software applications that do not gain entry through the protective system software. In addition to the logical security built into the system, physical security must be provided to ensure that access to computer systems and, consequently, to electronic records is prevented for unauthorized personnel. [Pg.103]

System security is also a concern for computer technology suppliers and contract developer s sites. The integrity of the computer environments that are used to maintain the application software has to be verified when auditing suppliers and/or developers. [Pg.106]

An assurance that the physical hardware, software, and the regulated electronic records are maintained in a secure environment is critical to the validated status of a computer system, particularly if it is an enterprise level system. Security must be instituted at several levels. Procedural controls must govern the physical access to computer systems (physical security). The access to individual computer system platforms is controlled by network specific security procedures (network security). Finally, application level security and associated authority checks control access to the computer system applications (applications security). [Pg.106]

In 1976, Whitfield Diffie developed public-key encryption as an alternative to private-key encryption. Public-key encryption is based on two halves of the same key that are generated with special software at the same time. The key pair are mathematically related so that the private key cannot be determined from the public key. Only one of the two halves of the key pair is required to encrypt a message, with the other half being used for decryption. In public key cryptography, one half of the key pair (the private key) is assigned to an individual, and is closely guarded and securely stored on the user s local disk in either an encrypted format or as part of a token that interfaces with the computer. The other half of the key is published in a public directory where all users can access it and this therefore referred to as the public key. [Pg.160]


See other pages where Computer software security is mentioned: [Pg.1074]    [Pg.353]    [Pg.307]    [Pg.85]    [Pg.9]    [Pg.90]    [Pg.111]    [Pg.332]    [Pg.86]    [Pg.135]    [Pg.34]    [Pg.219]    [Pg.461]    [Pg.662]    [Pg.236]    [Pg.158]    [Pg.231]    [Pg.126]    [Pg.302]    [Pg.228]    [Pg.519]    [Pg.596]    [Pg.608]    [Pg.318]    [Pg.42]    [Pg.591]    [Pg.113]    [Pg.175]    [Pg.124]    [Pg.145]    [Pg.203]    [Pg.624]    [Pg.331]    [Pg.192]   
See also in sourсe #XX -- [ Pg.222 ]




SEARCH



Computer security

© 2024 chempedia.info