Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Operations security

Backup features can be incorporated to provide additional operation security. Emergency run-down bearings (Eigure 6-2) prevent damage in die case of unforeseen power interruptions or electronic failures. [Pg.334]

The Department of Homeland Security has funded preliminary studies to elaborate specific chemical/biological threat vectors and to increase understanding of airflows in several terminals and boarding areas of San Francisco International Airport and Albuquerque Airport. It has also conducted an exercise in which the many airport decision makers (e.g., in areas of operations, security, fire control and prevention, public health and safety, and environmental is-... [Pg.40]

However, future challenges faced by nuclear power also relate to operating security concerns, nuclear weapons proliferation issues and final waste management, which are reflected in a mixed public acceptance. These are crucial areas to be addressed and developed, if nuclear power should expand its share in electricity and hydrogen generation in the future. [Pg.133]

Improve computer system and remote operational security. [Pg.94]

The main goals of our research were the analysis of the base block cipher protectability from cryptanalytic attacks in standard modes of operation and the ways to increase the stream modes of operation security. We also paid special attention to the problem of the gamma overlapping therefore, we selected the counter mode as a basis for the new perspective modes. The counter mode is a unique mode of operation, which has the fixed period and the random access properties. We investigated its property for the case of multiple encryption restarts with the same key. As result of our research, we are proposing two new schemes of modes of operation. They have advanced security. [Pg.298]

Keywords intrusion detection alert management operational security security information management... [Pg.349]

There were no written user standard operating procedures. .. [for] system validation, hardware and software change control, revalidation, user operations, security guidelines, software revision control, virus detection, disaster recovery, and backup and audit trail archival. [FDA 483, 1999]... [Pg.311]

Step 11 Periodically Review Security and Implement Improvements. Like any other component of a business operation, security must be managed to ensure that it continues to function properly, to adjust to changes in the nature of the assets and the threats, and to implement opportunities to improve efficiency and effectiveness. Security programs should involve ongoing discussions with law enforcement to monitor changes in the threat as well as interaction with company technical and business efforts to monitor changes in operations and assets. In addition, formal security vulnerability analyses should be repeated periodically. [Pg.306]

The M256 series also causes operational security problems during hours of limited visibility. A white light is needed to read both the ABC-M8 paper and... [Pg.165]

One aspect of security alone does not assure the needed protection. All three aspects of security—physical, logical, and operational security provisions— must be enforced. [Pg.246]

Recommendation 1. An operational security analysis program should be established for each chemical agent disposal facility to evaluate external factors (including the integrity of critical utilities) that could adversely impact continuing operability. (Tier 3)... [Pg.18]

The robot sensor is guided over the workpieces in the crate to determine the position of each of the workpieces. The workpiece surface that has been recognized is used to determine the three positions and orientations of the workpiece. The approach track with which the robot can grab and pick up the cast part is prepared from the workpiece position. The whole approach track is calculated in advance and reviewed for possible collisions. If the danger of a coUision exists, alternative tracks are calculated and the next cast part is grabbed if necessary. In this way the system maintains a high level of operational security and has sound protection from damage. [Pg.392]

This section describes different mechanisms for supporting an end-to-end QoS signalling and cross-operator security provision. These mechanisms along with other enhancements to the current network infrastructure will enable secure vertical... [Pg.201]

Force Protection—Security program developed to protect service members, civilian employees, family members, facilities and equipment, in all locations and situations, through the planned and integrated application of combating terrorism, physical security, operations security, personal protective services supported by intelligence, counterintelligence, and other security programs. [Pg.483]

Risk management seeks to identify and reduce all types of losses either completely or to an acceptable level at the lowest possible cost. Some organizations have risk managers, who analyze potential losses, such as financial losses and fire, weather, operations, security, legal, and other losses. They often purchase insurance to transfer potential losses. They work for banks, insurance companies, hospitals, health care facilities, and other businesses. They may also work with safety and health specialists on preventive strategies and approaches. [Pg.18]

Brocklehurst, S., Littlewood, B., Olovsson, T., Jonsson, E. On measurement of operational security. Aerospace and Electronic Systems Magazine, IEEE 9, 7-16 (1994)... [Pg.102]

Dacier, M., Deswarte, Y., Kaaniche, M. Quantitative assessment of operational security models and tools. CNRS-LAAS (1996)... [Pg.102]

The second pihar of risk assessment is the risk analysis (see Figure 21.1, point 3). It is the moment when ejq)erts from different backgrounds - operations, security department, technical departments and others, but also external stakeholders, especially police and law enforcement agencies - wiU analyze and assess the risks and risk scenarios. Risk analysis activities are divided into two main steps. [Pg.342]

Storage facilities should be adequately located, designed, constructed, operated, secured and maintained to allow for safe custody of the waste packages and for the protection of persons, property and the environment against the radiological hazards associated with radioactive waste. [Pg.46]

The safety case we are building is a significant piece of work. It has to demonstrate that the GDF concept is sound, and later iterations will need to demonstrate that the final site is appropriate and its operations secure, and that it will continue to provide a safe disposal location for many thousands of years after it is finally closed. In fact, we are working on a safety case that covers hundreds of thousands of years (see Figure 1 for an illustration of how radioactive decay will affect the radionuclide inventory). [Pg.50]


See other pages where Operations security is mentioned: [Pg.1203]    [Pg.15]    [Pg.32]    [Pg.37]    [Pg.297]    [Pg.533]    [Pg.166]    [Pg.519]    [Pg.16]    [Pg.20]    [Pg.101]    [Pg.19]    [Pg.28]    [Pg.30]    [Pg.294]    [Pg.1284]    [Pg.178]    [Pg.130]    [Pg.885]    [Pg.266]    [Pg.502]    [Pg.2532]    [Pg.138]    [Pg.49]    [Pg.275]    [Pg.77]   
See also in sourсe #XX -- [ Pg.294 ]




SEARCH



© 2024 chempedia.info