Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security aspects

An increase in the rate of crime involving laser and inkjet printed documents has been the motivation for reviewing the analytical techniques for classification, identification, detection and analysis of laser and inkjet printed documents (21). [Pg.19]

It has been described how the analysis of printer inks can be used for the establishment of the origin of a printed document (21). [Pg.19]


It must be pointed out that GMP guides are not intended to cover health security aspects for the personnel engaged in manufacturing. They may be very important in the manufacture of certain bulk pharmaceutical chemicals or medicinal products, such as cytostatics, antibiotics, or other highly active, biological and radioactive products, but they are governed by other provisions of law. [Pg.515]

Impact to network (does it run on LAN or WAN ) p. The security aspects of the system/ apphcation q. The audit trail function in the application ... [Pg.1047]

W. Winter and L. Huber, Implementing 21CFR Part 11 Electronic Signatures and Records in Analytical Laboratories, part 2, Security Aspects for Systems and Applications, BioPharm 13(1), 44-50, 2000. [Pg.275]

Logical access controls for computer systems, including authority checks, form another security aspect. Authority checks are based on the various roles and responsibilities assigned to individuals known to the system. Computer systems must be designed to make distinctions between the controlled access (a) to the system, (b) to functions in the system, and (c) to input and output devices used by the system. [Pg.191]

Hydrogen as fuel may be produced from indigenous sources, which is an attractive option from the national security aspect. [Pg.114]

Type deals with the group of IT security aspects (concerns), like ... [Pg.10]

Standards are important in fact, they have become necessary in our time. This paper briefly addresses that importance, that need. Then it addresses a small subset of all standards, ones that apply to IT, ones that apply to the security aspects of IT, ones that are or are intended to be internationally accepted. The focus is on international IT Security standards. [Pg.26]

Embedded Software constitutes a very specific and critical part of embedded systems. It provides new capabilities to HW transducers ( defines physical behaviour of a complex non-linear device ), because of its potential criticality we need HW/SW co-design, and issues like dependability, low power, timeliness are becoming software issues with all the consequences. We need dependable system architectures to cope with the potential risks, including safety as well as security requirements and counter measures. Be aware, that security aspects are often neglected by safety engineers ... [Pg.164]

The conclusion was to add separate clauses into IEC 61508 everywhere where security could have an impact on safety giving advice on how to integrate the security aspect as an additional hazard (risk) for the safety-critical system, i.e., to look at the safety impact of security breaches and then... [Pg.167]

The author was member of JTT4, and has similar experiences from research projects in the area of dependable systems, where it was either very difficult, under cost-pressure and funding priorities, to include certain security aspects besides the safety related issues, or, after reduction of funds,... [Pg.168]

Beaver, C. L., D.R. Gallup, W.D. NeuMann, and M.D. Torgerson, Key management for SCAD A, Scandia National Laboratories, March 2002, Security Aspects and requirements of the Supervisory Control and data Acquisition System, for the Electric Power Grid... [Pg.174]

The implementation of an effective security regime is required to comply with the regulators expectations for control of electronic records. The pharmaceutical manufacturer will be responsible for providing maintenance of the security aspects of LIMS. This is normally accomplished through software protection (e.g., passwords and log-on accounts) but may also take the form of protection through physical restrictions (e.g., locked-up or restricted areas). The management of this function should be in accordance with a formal SOP. The use of passwords and high-level accounts must be strictly controlled to prevent security breaches. Typical examples of control should be ... [Pg.537]

All the material must be retained in a secure location for easy access, under the responsibility of a management-designated archivist and deputy. The security aspect of the archive should preclude damage from outside sources, fire, water, rodents, etc. [Pg.1938]

Security aspects were briefly mentioned before Only certain users should get access to a conference, which is controlled by SCCS together with a conference leader. Also, it is important to encrypt data which are exchanged if team members from different companies are having a conference with confident information. This functionality is included in MTP, which is used by SCCS for multicast communication. [Pg.295]

One more security aspect also concerns the cooperation between companies. If no third party should know about the cooperation partners, methods to guarantee privacy and anonymity in the Internet are necessary. [Pg.296]

Security aspect. This review of AUM Shinrikyo s terrorist activity reveals a new threat to stability of democratic societies - chemical terrorism. Especially terrifying dimension of the problem is the fact that members of this fanatic cult used nerve gases three times against civilian population - sarin in Matsumoto and Tokyo in June, 1994 and in March, 1995, respectively, and VX in Tokyo in January, 1995. The two sarin attacks were especially dangerous, because they threatened the lives of hundreds of citizens. [Pg.111]

Johansson, B. (2013). Security aspects of future renewable energy systems-A short overview. Energy, 61, 598-605. [Pg.96]

There are two diametrically opposing views as to the effect this difference has on the security aspect of the Lettres de Gage the first is that the Luxembourg could be considered to be more secure than its German counterpart. This is thought to be due to the fact that in their search for diversified assets to use as collateral for their Pfandbrief-like product, Luxembourg banks will diversify their exposure to top-rated OECD sovereigns such as Australia and Japan. [Pg.225]

Bamert T., Kosmowski K.T., Sliwinski M. 2008a. Security aspects in verification of the safety integrity level of distributed control and protection systems. Journal of KONBIN, Air Force Institute of Technology, KONBIN 2008, Wroclaw. Warsaw. 150-176. [Pg.104]

As main conclusion we establish the requirement for a smart identification and testing of open source software components before integrating them during the software development process, in order to produce reliable software. Also, we conclude with the reqitire-ment for a revised definition of the software reUabiUty in order to cover software security aspects. [Pg.1281]

Our experience with DlSTeFAX project shows that the traditional definition of software rehabH-ity is necessary to be reconsidered for taking into accoimt security aspects for distributed appHcations as Schneidewind (2006), aheady remarked. In this view a rehable software system wiU be less vulnerable to intrusion by attack prevention and, will assure fast recovering in the case of hackers attacks. So, the software rehabihty is better to be defined as the probabihty that software will not cause the system failure for a specified time taking into accoimt specified operational and security profiles whether the failure is generated by a fault in the code or by the inability of the system to prevent, detect, and manage cyber... [Pg.1285]

The approach of Table 4 is exemplified by the Code s chapter 14 Bnsiness Continnity Management-Objective 14.1 Information security aspects of business continnity management ... [Pg.1878]

Train, communicate, mentor. A comprehensive process that manages the entire life cycle of a chemical in the laboratory would result in responsible management of the safety and security aspects of that chemical. The CSO is responsible for ensuring that proper processes are established and communicated to all, but it takes a strong commitment by top leaders in the institution to create the best safety and security systems and to establish a culture that ensures the well-being of personnel and the public. [Pg.46]


See other pages where Security aspects is mentioned: [Pg.266]    [Pg.161]    [Pg.174]    [Pg.9]    [Pg.13]    [Pg.20]    [Pg.364]    [Pg.3]    [Pg.223]    [Pg.295]    [Pg.179]    [Pg.300]    [Pg.408]    [Pg.441]    [Pg.234]    [Pg.253]    [Pg.201]    [Pg.214]    [Pg.146]    [Pg.198]    [Pg.97]    [Pg.11]    [Pg.44]    [Pg.351]    [Pg.19]   
See also in sourсe #XX -- [ Pg.19 ]




SEARCH



Security insurance aspects

© 2024 chempedia.info