Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Secure communications

Where backdoor or vendor connections do exist in SCADA systems, strong authentication must be implemented to ensure secure communications. Modems, wireless, and wired networks used for communications and maintenance represent a significant vulnerability to the SCADA network and remote sites. Successful war dialing or war driving attacks could allow an attacker to bypass all other controls and have direct access to the SCADA network or resources. To minimize the risk of such attacks, disable inbound access and replace it with some type of callback system. [Pg.130]

Merk82 Ralph C. Merkle Protocols for Public Key Cryptosystems AAAS Selected Symposium 69, Secure Communications and Asymmetric Cryptosystems Westview Press, Boulder, Colorado 1982,73-104. [Pg.380]

Theoretical progress will no doubt be immediately followed by experimental advances. The development of new technologies can extend the limit of secure communication. Mainly detectors in the 1550-nm fiber-optic communication window require a big improvement. Any reduction of the fiber attenuation would also greatly contribute to extending the communication range. [Pg.575]

D. B. Baker and D. K. Masys. 1999. PCASSO A design for secure communication of personal health information via the Internet. International Journal of Medical Informatics 54 97-104. [Pg.550]

F. de Meyer, P.-A. Lundgren, G. de Moor, and T. Fiers. 1998. Determination of user requirements for the secure communication of electronic medical record information. International Journal of Medical Informatics 49 125-130. [Pg.550]

D. Threat Information. For each of these threats and site types, several items are required to complete an environmental threat assessment. Since the pertinent site information is normally classified, secure communications may be needed. [Pg.12]

The contention that institutional norms exert a conforming influence on members is, of course, the key claim of institutional and conventional constructivist approaches in international relations. See, for instance, Thomas Franck, The Tower of Legitimacy among Nations (New York, 1990) Martha Finnemore, National Interests in International Society (Ithaca, 1996) and Amitav Acharya, Constructing a Security Community in Southeast Asia ASEAN and the Problem of Regional Order (London, zooi). [Pg.70]

Acharya, Amitav. Constructing a Security Community in Southeast Asia ASEAN and the Problem of Regional Order. London Routledge, 2001. [Pg.271]

Individual BIDS are combined together into a corps-wide network by a secure communication system. An improved BIDS is being developed with the capability to detect two species of Brucella, Francisella tularensis, and ricin toxin. Detection capabilities for additional agents will no doubt be added to future models.33... [Pg.383]

They can t," Nagar told her. "Because they re not rebels." He began datavising the First Admiral s warning over the squadron s secure communications channels. [Pg.264]

Step 3 The entered user ID and password are sent back to the server via the Internet by the secured communication protocol HTTPS. The server receives that information and checks information on the database that accumulates information about the client and other various data. If the user ID and password correspond to those already registered, the customer is permitted to use the service. [Pg.736]

The latter limitation also applies to individuals. Technology to establish secure communication channels is widely available, but a token and pin code for authentication mustbe distributed beforehand. Many countries issue electronic ID cards that can serve to authenticate any citizen (the techniques for this are outside the scope of this book, but be assured that the level of security is high). Thus, it gradually is becoming possible to establish trusted communication over the Internet without sacrificing flexibility. [Pg.139]

Plant Security Communication Equipment Door Equipment Computer Equipment Backup Generator UPS Equipment Motor Control Centers... [Pg.137]

Secure communication for obtaining outside help is vitally important. [Pg.125]

Cryptography plays a vital role in establishing secure links in modem telecommunication networks. Information is transformed and transmitted in such a way that a third party cannot extract valuable and pertinent data from a secure communication link. Many cryptographic algorithms have been proposed such as AES [1], DES [2], Twofish [3], Serpent [4], etc. [Pg.39]

Whitman, M.E. (2003). Enemy atthe gate Threats to information security. Communications of the ACM, 46(8), 91. [Pg.161]

Main security solutions proposed to address security requirements of patient-monitoring systems reside in the areas of encryption and secure communication. Access-control techniques need to be developed to address the privacy issues in eHealth applications. In particular, procedures for authentication (user identification) and authorization (access right checking) are essential for acceptable and sustainable eHealth applications. The authentication function ensures that users are indeed who they claim to be. Therefore, an unauthorized party should not be able to receive or access a patient s medical data. Various techniques being considered include a combination of different authentication atomics. These atomics include biometric information (fingerprint, retina scan, typing pattern, etc.) and information the user knows (mother s maiden name), user possessions (e.g., smart card identification systems), and may also include current location and/or the end-user terminal identity (media access control [MAC] hardware address) and time of access. [Pg.360]

The book is organized in three parts containing chapters on smart textiles for medical purposes transportation and energy and finally protection, security, communication and textile electronics. [Pg.3]

Smart textiles for protection, security, communication and other electronics... [Pg.4]

Limited research has been reported in the literature regarding secure communications in WBANs utilizing biometric information. Venkatasubramanian et al. provided an overview of security solutions in pervasive health care systems, where biomedical information was utihzed for securing data collected by medical sensors, and for controUing access to health information managed by pervasive health care systems. Cherukuri et al. proposed a biometrics-based key distribution scheme to secure the... [Pg.174]

The BSR generators discussed previously have one serious flaw they are not secure. An intelligent enemy can determine the generator key and architecture after observing 2N output symbols. Secure communication systems must use more elaborate generators. Although the internal mechanism of secure generators vary, they will still be finite state machines that must be initialized by a key and have an output that is ultimately periodic. [Pg.1443]

Conduit In a network, information flows in and out or within zones. For secured communication, ISA/IEC 62443 series standard defines a special type of security zone communication as a communication conduit. Conduit types are ... [Pg.865]


See other pages where Secure communications is mentioned: [Pg.70]    [Pg.133]    [Pg.403]    [Pg.115]    [Pg.336]    [Pg.116]    [Pg.1]    [Pg.271]    [Pg.251]    [Pg.172]    [Pg.229]    [Pg.121]    [Pg.123]    [Pg.129]    [Pg.46]    [Pg.16]    [Pg.178]    [Pg.1898]    [Pg.15]    [Pg.495]    [Pg.216]    [Pg.45]    [Pg.174]    [Pg.175]    [Pg.2535]    [Pg.2560]    [Pg.1439]   
See also in sourсe #XX -- [ Pg.335 ]




SEARCH



Community Food Security Coalition

© 2024 chempedia.info