Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Defaulting security

Analyze each SCADA device to determine whether security features are present. Additionally, factory default security settings (such as in computer network firewalls) are often set to provide maximum usability, but minimal security. Set all security features to provide the maximum level of security. Allow settings below maximum security only after a thorough risk assessment of the consequences of reducing the security level. [Pg.130]

Default securities Paying the recovery rate in the case of default and nothing otherwise. [Pg.173]

Therefore, the survival securities face the timing risk of default only and the default securities both, the timing risk of default and the risk of recovery in default. [Pg.173]

The Import Wizard process for Microsoft Access files works like the one for Excel files and produces similar PROC IMPORT code. Keep in mind that text fields get a default length of 255 characters when PROC IMPORT is used with Microsoft Access files. PROC IMPORT adds a number of file security options, as well as the ability to scan memo fields via the SCANMEMO option to determine the width of character fields in Microsoft Access files. [Pg.63]

Some SCADA systems use unique, proprietary protocols for communications between field devices and servers. Often the security of SCADA systems is based solely on the secrecy of these protocols. Unfortunately, obscure protocols provide very little real security. Do not rely on proprietary protocols or factor default configuration settings to protect your system. Additionally, demand that vendors disclose any backdoor or vendor interfaces to your SCADA systems, and expect them to provide systems that are capable of being secured. [Pg.130]

The proposed secure personal content delivery protocol does not use time construction by default. There are additional steps required in the protocol. Let TA denotes the Time Agent and s denotes the secret belonging to the Time Agent. In order to use forward-time hash function constructions the protocol has the following steps ... [Pg.340]

Bureau of Industry and Security, U S. Department of Commerce, The Entity List Entities of Proliferation Concern Listed in Supplement No. 4 to Part 744 of the Export Administration Regulations, January 9, 2004, http //www.bxa.doc.gov/ Entities/Default.htm (as of April 6, 2004). [Pg.47]

By default, the share is a full control share in Windows NT/2000. This means that anyone on the network can come in and view, modify, or even delete the files in the share. Often this is just a bit too dangerous, and as such, you will probably want to use a read-only or a depends-on password security setting. (A Windows 9x share is read-only by default. Anyone on the network can view files in the share.)... [Pg.734]

To achieve a true sale, an originator must limit, if not forego, its right to the residual value of the receivables sold to the SPV. This residual value can often be significant since the SPV must obtain a level of receivables well in excess of the amount necessary to pay the securities issued by the SPV. Such "overcollateralization" is needed to assure investors and providers of liquidity and credit enhancement that they will not suffer losses from delayed collection or defaults. Conflict may develop over the amount of overcollateralization necessary for the SPV originators want the level of overcollateralization to be low, while investors and credit enhancers want it to be high. Because the amount of receivables... [Pg.11]

The key among almost all patient wishes in modern times, and mentioned many times above, is the wish for privacy. This is the assumed wish by default if not otherwise specified, and of no less concern to national security. [Pg.231]

The default situation must be an automatic lock out of the access device after a defined period of time, but very short times will pose excessive inconvenience. The security situation needs to be seen in the context of the total security system from the perimeter fence to the seat in front of a terminal in a manufacturing suite or a dedicated office. Access around sites is often controlled and restricted frequently, for all but the most sensitive of tasks, others trained and authorized to carry out the same tasks will be present in the same area. These factors all mitigate against the need to have a very short lock-out time. [Pg.460]

See UNMICT, Press Release, Prosecutor fallow addresses UN Security Council (5 June 2014), http //www.unmict.oig/en/news/prosecutor-jallow-addresses-un-security-council (accessed 4 March 2015) The report can be found here http //www.unmict.org/sites/default/files/attachments/arti-cles/050614%20report.pdf (accessed 4 March 2015). [Pg.243]

Cash flow is simply the cash that is expected to be received in the future from owning a financial asset. For a fixed-income security, it does not matter whether the cash flow is interest income or repayment of principal. A security s cash flows represent the sum of each period s expected cash flow. Even if we disregard default, the cash flows for some fixed-income securities are simple to forecast accurately. Noncallable benchmark government securities possess this feature since they have known cash flows. For benchmark government securities, the cash flows consist of the coupon interest payments every year up to and including the maturity date and the principal repayment at the maturity date. [Pg.42]

The minimum interest rate that an investor should require is the yield available in the marketplace on a default-free cash flow. For bonds whose cash flows are denominated in euros, yields on European government securities serve as benchmarks for default-free interest rates. In some European countries, the swap curve serves as a benchmark for pricing spread product (e.g., corporate bonds). For now, we can think of the minimum interest rate that investors require as the yield on a comparable maturity benchmark security. [Pg.43]

The discussion is easily expanded to include risky floaters (e.g., corporate floaters) without a call feature or other embedded options. A floater pays a spread above the reference rate (i.e., the quoted margin) to compensate the investor for the risks (e.g., default, liquidity, etc.) associated with this security. The quoted margin is established on the floater s issue date and is fixed to maturity. If the market s evaluation of the risk of holding the floater does not change, the risky floater will be repriced to par on each coupon reset date just as with the default-free floater. This result holds as long as the issuer s risk can be characterized by a constant markup over the risk-free rate. [Pg.59]

All in all, the secured nature of this type of product strongly reduces the loss potential in a default scenario and to date, since their inception back in 1869, no Cedulas Hipotecarias has ever defaulted. In Moody s opinion these factors justify a rating of two notches above the senior unsecured debt rating for the issuer. [Pg.224]

This is part of the general collateral (GC) market, and is more common in the United States than elsewhere. Consider the case of a cash-rich institution investing in GC as an alternative to deposits or commercial paper. The better the quality of collateral, the lower the yield the institution can expect, while the mechanics of settlement may also affect the repo rate. The most secure procedure is to take physical possession of the collateral. However, if the dealer needs one or more substitutions during the term of the trade, the settlement costs involved may make the trade unworkable for one or both parties. Therefore, the dealer may offer to hold the securities in his own custody against the investor s cash. This is known as a hold-in-custody (HIC) repo. The advantage of this trade is that since securities do not physically move, no settlement charges are incurred. However, this carries some risk for the investor because they only have the dealer s word that their cash is indeed fully collateralised in the event of default. Thus this type of trade is sometime referred to as a Trust Me repo it is also referred to as a due-bill repo or a letter repo. [Pg.333]

In the US market there have been cases in which securities houses that went into bankruptcy and defaulted on loans were found to have pledged the same collateral for multiple HIC repo trades. Investors dealing in HIC repo must ensure ... [Pg.333]


See other pages where Defaulting security is mentioned: [Pg.925]    [Pg.925]    [Pg.123]    [Pg.129]    [Pg.117]    [Pg.15]    [Pg.133]    [Pg.126]    [Pg.13]    [Pg.30]    [Pg.354]    [Pg.40]    [Pg.141]    [Pg.369]    [Pg.789]    [Pg.902]    [Pg.2555]    [Pg.366]    [Pg.184]    [Pg.10]    [Pg.13]    [Pg.14]    [Pg.319]    [Pg.319]    [Pg.698]    [Pg.13]    [Pg.88]    [Pg.194]    [Pg.203]    [Pg.222]    [Pg.223]   
See also in sourсe #XX -- [ Pg.921 ]




SEARCH



© 2024 chempedia.info