Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Cyber security

Cyber security Protection of critical information systems including hardware, software, infrastructure, and data from loss, corruption, theft, or damage. [Pg.105]

Security layers of protection Also known as concentric rings of protection, a concept of providing multiple independent and overlapping layers of protection in depth. For security purposes, this may include various layers of protection such as countersurveillance, counterintelligence, physical security, and cyber security. [Pg.105]

The American Chemistry Council s Responsible Care Security Code is designed to encourage continuous improvement in security performance by using a risk-based approach to identify, assess, and address vulnerabilities prevent or mitigate incidents enhance training and response capabilities and maintain and improve relationships with key stakeholders. As a condition of membership in the council, each member company must implement the Security Code for facilities, transportation and value chain, and cyber security. [Pg.109]

The following steps focus on management actions to establish an effective cyber security program ... [Pg.132]

Clearly define cyber security roles, responsibilities, and authorities for managers, system administrators, and users. [Pg.132]

Robust performance evaluation processes are needed to provide organizations with feedback on the effectiveness of cyber security policy and technical implementation. A sign of a mature organization is one that is able to self-identify... [Pg.133]

Senior organizational leadership should establish expectations for cyber security performance and hold individuals accountable for their performance. [Pg.134]

U.S. Department of Energy (DOE). 2001. 21 steps to improve cyber security of SCADA networks. Washington, DC Department of Energy. [Pg.135]

W. Cyber-security/Supervisory Control and Data Acquisition (SCADA) system attack response (other than incident-specific, e.g., hacker)... [Pg.145]

Unfortunately, the committee decided not to take into account in-depth considerations on security in the new standard draft. The security issue was delegated to another committee of SC65, to SC65C, WG 13, Digital Communications, Cyber Security (9), and the chairman of JTT4 became member of this committee. Unfortunately, this committee was not at all interested in safety, only in communications and cyber security. Here again, both worlds kept themselves separated ... [Pg.168]

The term physical security refers to equipment, building and grounds design, and security practices designed to prevent physical attacks against a facility s property, personnel, or information. It does not include cyber security. Physical security is accomplished by ... [Pg.293]

Hinne Hettema (1963) is an Honorary Research Fellow in the Department of Philosophy at the University of Auckland. He completed his Ph.D. in theoretical chemistry at the Radboud University in Nijmegen (1993) and his Ph.D. in philosophy at the Rijksuniversiteit Groningen (2012). He lives in Auckland, New Zealand. His research interests are in the philosophy of science, philosophy of chemistry, and philosophy of cyber security. He is the translator of Quantum Chemistry, classical scientific papers, and author of Reducing Chemistry to Physics Limits, Models, Consequences, http //www.arts.auckland.ac.nz/people/hhet001... [Pg.243]

Cyber security Computer viruses Hackers The use of computer-based systems in sophisticated air navigation systems and on-board aircraft control and communications systems... [Pg.161]

The nation did make important progress in the national areas for improvement identified in the 2012 NPR—cyber security, recovery-focused core capabilities, and integration of individuals with disabilities and access and functional needs—but challenges remain. Enhancing the resilience of infrastructure systems and maturing the role of public-private partnerships are newly identified national areas for improvement. [Pg.156]

Currently (May 2014) webinars like Changes to PSM Standard Executive Order 13650 Webinar Series, Operating Discipline, LNG Webinar Series, Storage Tanks The Hidden Threat Webinar Series are available. White papers are also available on a wide spread of topics from Safety Cirlture, Reducing the Risk of Dust Explosion Hazards, Control System Cyber Security, etc. Other information is available on risk management, security, integrity marragemerrt arrd other topics. [Pg.451]

Support for access security and enhancement of cyber security for SIS so that revisions in BPCS do not affect SIS... [Pg.839]

Separate SIS zone and use of a firewall to combat risk from cyber security in an integrated system. lEC 6151 land 62443 standards need to be followed. [Pg.841]


See other pages where Cyber security is mentioned: [Pg.108]    [Pg.109]    [Pg.55]    [Pg.117]    [Pg.123]    [Pg.132]    [Pg.132]    [Pg.133]    [Pg.133]    [Pg.133]    [Pg.134]    [Pg.134]    [Pg.49]    [Pg.44]    [Pg.2610]    [Pg.2611]    [Pg.2590]    [Pg.2591]    [Pg.442]    [Pg.299]    [Pg.148]    [Pg.148]    [Pg.25]    [Pg.25]    [Pg.549]    [Pg.231]    [Pg.5]    [Pg.842]   
See also in sourсe #XX -- [ Pg.47 , Pg.50 , Pg.51 ]




SEARCH



Cyber

© 2024 chempedia.info