Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Information leakage

Disclosure or information leakage Information is disclosed or revealed to an unauthorized person or process. This involves direct attacks such as eavesdropping or wiretapping or more subtle attacks such as traffic analysis. [Pg.732]

For SCM strategists, RFID facilitates detailed data collection and statistical analysis, from gross to very fine-grained levels. For instanee, RFID readers in a retailer s store can capture data on product arrival, placement, and movement, whieh can present the cyclieal patterns. This key eapabil-ity of RFID allows the executives to link the date received with the date sold. Moreover, it ean help to identify possible points of information leakage throughout the entire supply chain. As a result, RFID increases the visibility in the supply ehain, which can be used to make strategie deeisions to further increase eompetitive advantage. [Pg.124]

Enforcing Information Leakage Today A Practical Attack... [Pg.151]

In this section we illustrate the black box perspective and the basic attack principles by presenting an information leakage attack on a central gateway ECU from a recent car series (built since 2005) of a big international manufacturer. It allows an attacker to bypass the software-based network isolation and to enforce the leakage of arbitrary (potentially privacy relevant) internal communication to the outside. The attack serves as a practical example for privacy-relevant attacks on automotive IT-networks that are already possible today (even from a black-box perspective) and exemplifies the increasing relevance of privacy threats to automotive IT. [Pg.151]

Figure 18.24(b) illustrates the use of a leakage current monitor. The instrument can be used to display or monitor on a computer remotely and store data at intervals as required to provide diagnostic information. Now it is easier to take corrective measures in time. The instrument can also be programmed to give an alarm at a preset value of I, when the actual operating conditions exceed this. [Pg.619]

Schibbye, 96 Schultz, 426 Seal clearance, 222 Seal leakage, 213 Seal leakage calculations carbon ring, 533 How coefficient, 537 staggered labyrinth, 533 straight labyrinth, 532 Seal oil drainers, 321 Seal oil overhead tank, 319 Seal specification information, 449... [Pg.550]

A refinery operation produces about 500,000 barrels of crude per year. There are approximately 1500 gate valves used in the operation. Develop an estimate of the potential hydrocarbon emissions resulting from valve leakage. What is this worth in terms of lost revenues to the facility You can find some information on typical valve leakage rates from searching on w w w. google. com. [Pg.147]

Limited information is available on values of for industrial buildings. The effective leakage area, CjA, can be determined by means of a building pressurization or depressurization test.-7 A range of values of for cracks formed around closed windows are given in Table 7.33. These should be used with a value of P = 0.67. [Pg.580]

All of the information listed directly above is correlated to an all damages mode, individual subcategories of failure modes (internal leakage, for instance), and the influence parameters and their subdivisions. Realtime access is possible through a data base management system. [Pg.66]

Natural gas must always be contained in appropriate pipes or vessels and precautions taken to ensure that leakage cannot occur. If a gas leak does occur, the main gas supply should be shut off, the area ventilated and the gas supplier informed. Electrical switches should not be turned on or off, portable electrical appliances including handheld torches should not be operated and all other possible sources of ignition removed or rendered inoperable and the affected area ventilated. In circumstances of excessive leakage, the building should be evacuated. [Pg.273]

Batteries may be taken to a household-hazardous-waste collection or a local battery collection program. One can also contact the battery manufacturer for other disposal options or for information on collection programs. If disposal is the only option, and the household batteries are not banned from the permitted landfill in the area, one should protect the batteries for disposal by placing them in a sturdy plastic bag in a sturdy container to help guard against leakage. Waste batteries should not be burned because of the metals that could explode. When burned, some heavy metals such as mercury may vaporize and escape into the air, and cadmium and lead may end up in the ash.12... [Pg.1229]

There is varying information on the leakage of lead from the dumps of Guiyu. Based on the SFA two approaches concerning lead given by van Oers [33] and Thomas et al. [34] have been chosen. The calculations are supposed to be highly uncertain as Thomas et al. [34] mentioned. The results based on van Oers [33] are presented in table 14. [Pg.334]

Figure 5.13. Leakage current through a solution-processed Si02 film (solid line) and a conventional CVD formed Si02 film (broken line). [Reproduced with permission from Ref. 24. Copyright 2007 Society for Information Display.]... Figure 5.13. Leakage current through a solution-processed Si02 film (solid line) and a conventional CVD formed Si02 film (broken line). [Reproduced with permission from Ref. 24. Copyright 2007 Society for Information Display.]...
Step 4. Samples are analyzed for tracer and hydrocarbon vapors by means of a very sensitive gas chromatograph the presence of tracer vapors, which can be detected in the low parts-per-triUion, provides unambiguous information about the occurrence of leakage and its location. [Pg.104]

Step 5. Because information about site contamination is important, the plant manager is provided with a hydrocarbon site survey at the same time hydrocarbon vapor maps serve to show the magnimde of leakage and the extent of the contamination if leaks are detected if no leaks are detected, the absence of hydrocarbons confirms this finding. [Pg.104]


See other pages where Information leakage is mentioned: [Pg.153]    [Pg.154]    [Pg.155]    [Pg.157]    [Pg.24]    [Pg.44]    [Pg.153]    [Pg.154]    [Pg.155]    [Pg.157]    [Pg.24]    [Pg.44]    [Pg.102]    [Pg.125]    [Pg.223]    [Pg.352]    [Pg.2309]    [Pg.351]    [Pg.377]    [Pg.893]    [Pg.273]    [Pg.306]    [Pg.261]    [Pg.347]    [Pg.245]    [Pg.48]    [Pg.128]    [Pg.133]    [Pg.235]    [Pg.135]    [Pg.162]    [Pg.290]    [Pg.96]    [Pg.157]    [Pg.24]    [Pg.201]    [Pg.169]    [Pg.97]    [Pg.296]    [Pg.83]    [Pg.191]   
See also in sourсe #XX -- [ Pg.153 ]

See also in sourсe #XX -- [ Pg.440 ]




SEARCH



Leakage

© 2024 chempedia.info