Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security concerns

The hardware and software used to implement LIMS systems must be vahdated. Computers and networks need to be examined for potential impact of component failure on LIMS data. Security concerns regarding control of access to LIMS information must be addressed. Software, operating systems, and database management systems used in the implementation of LIMS systems must be vahdated to protect against data cormption and loss. Mechanisms for fault-tolerant operation and LIMS data backup and restoration should be documented and tested. One approach to vahdation of LIMS hardware and software is to choose vendors whose products are precertified however, the ultimate responsibihty for vahdation remains with the user. Vahdating the LIMS system s operation involves a substantial amount of work, and an adequate vahdation infrastmcture is a prerequisite for the constmction of a dependable and flexible LIMS system. [Pg.518]

The use of component logic models to build system fault logic has been discussed by several authors for chemical and electrical systems (Powers and Thompkins, 1974 Fussell, 197.S and Powers and Lapp, 1976). In addition, generic sabotage fault trees have been used for some time in the analysis of security concerns for nuclear power plants (NUREG /CR-0809, NUREG/CR. 121,... [Pg.119]

The food technologist may be especially interested in the fate of the carotenoids in the seed oil. Like red palm oil, the resulting carotenoid-pigmented canola oil may be more stable due to the antioxidant properties of carotenoids and may be more attractive to consumers. Alternatively, for food security concerns, transgenic soybean or canola oils and seed meals that are genetically modified for more efficient bio-diesel production may be bio-safety marked with lipid-soluble carotenoids and water-soluble anthocyanins, respectively. Potatoes are excellent potential sources of dietary carotenoids, and over-expression of CrtB in tubers led to the accumulation of P-carotene. Potatoes normally have low levels of leaf-type carotenoids, like canola cotyledons. [Pg.375]

Security Does the system at runtime prevent unauthorized access or (mis)use Security concerns typically include at least authentication—ensuring that the apparent source of a request is, in fact, who it claims to be—and authorization ensuring that the authenticated user is permitted to access the needed set of resources. Security should be modeled as any other behavioral requirement is modeled. If an existing security mechanism or product is being used (for example, Kerberos), use a model of that mechanism as a part of your design models. [Pg.513]

Although nations continue to be a central actors in international politics, they increasingly participate and are engaged in cooperation with international and regional organizations (e.g., NATO, UN, EU, etc.) to respond to non-traditional security concerns including the environment. [Pg.172]

Clean options include nuclear power to produce hydrogen with no emissions. But expanding nuclear power means overcoming safety, waste disposal and security concerns. [Pg.142]

However, future challenges faced by nuclear power also relate to operating security concerns, nuclear weapons proliferation issues and final waste management, which are reflected in a mixed public acceptance. These are crucial areas to be addressed and developed, if nuclear power should expand its share in electricity and hydrogen generation in the future. [Pg.133]

Toxic substances such as chlorine and ammonia are a homeland security concern in part because of their widespread use in industrial applications and, hence, their accessibility. When released into the air or water in high concentrations, they can be very poisonous. The major use of ammonia and its compounds is as fertilizers. [Pg.66]

In addition to the facilities monitored by the Risk Management Program, numerous facilities with smaller quantities of such chemicals can raise homeland security concerns. In particular, the fifteen thousand facilities in the program exclude retail outlets for flammable chemicals used as fuel, which are not required to report to USEPA. The many smaller suppliers, transporters, and consumers of those chemicals may hold sufficient quantities of dangerous materials to cause harm if the materials were released or set on fire. They may also have the information or equipment necessary to make even more dangerous substances. Further, because those smaller potential targets are especially dispersed and potentially more difficult to defend, they may be attractive as terrorist targets (GAO 2004). [Pg.72]

According to the Government Accountability Office (2003), historically, security concerns about control systems (SCADA included) were related primarily to protecting... [Pg.123]

Perform technical audits of SCADA devices and networks, and any other connected networks, to identify security concerns. [Pg.131]

Another very important point that favors hydrogen is that it can be produced from water. Water is much more evenly distributed geographically than oil reserves and it is renewable. This will dramatically reduce the geopolitical and national security concerns currently associated with fossil fuels. [Pg.22]

Example President Kennedy was well aware of the security risks that his trip to Dallas posed for both himself and his staff However, in a briefing to his cabinet on the day before he left he said, I thank you all for the detailed information you have provided for me, and I am grateful for the work that you have all undertaken in keeping me up to date about current security concerns. However, after evaluating all the facts at hand and openly acknowledging the risks involved in such a campaign trip at this moment, I have decided to go to Dallas. Ultimately, it is in the best interests of the American people if I go. ... [Pg.100]

As a writer, you can analyze why President Kennedy chose to follow through on his trip despite security concerns, but even though you can argue that he did it for the good of the American people, the direct quote from his speech proves this fact to the reader beyond a doubt. Just be sure to provide a footnote or parenthetical citation at the end of the speech that informs the reader of the book and the source of your information. Therefore, your reader, curious about this speech and its origins, will find ... [Pg.100]

There me also some disadvantages associated with the use of personal computers. Desktop computers have limited mobility. Portable personal computers are typically more expensive, have more limited capabilities than desktop machines, and present greater security concerns. Data management can be more complicated if results from different testing occasions are required in a central database or if an individual is tested in multiple settings with different computers. [Pg.105]

Review specified threats against the security concerns, revealing topics not covered, not fully covered, or difficult to cover by threats, and cover them by defining OSPs, usually together with AU- or AP-type generics. [Pg.16]

TOE and its environment. This is the central point of the whole ST or PP, a kind of bridge between security concerns and precise security specification based on components. The trade-off concerning responsibility for security between TOE and its environment is very important there, because it implies the nature and cost of the developed product. [Pg.17]

Using the TOE environment threats specification select suitable OEIT, OEPH and OESM to cover any security concern. [Pg.17]

In the congressional research service (CRS) report for the USA Congress (2005), Shea and Morgan [75] included chemical luminescence as one of the trace detection techniques for aviation security. They point out that bulk detection of explosives on airline passengers is of interest and that these systems detect only bulk quantities of explosives, so they would not raise nuisance alarms on passengers who have recently handled explosives for innocuous reasons. They also mention that trace detection techniques would also detect bulk quantities of explosives and may raise security concerns about passengers who have been in contact with explosives. [Pg.36]

When considering the relative safety of urinalysis and hair analysis, one is frequently misled by a false sense of security concerning the urine test. This misperception arises from the erroneous picture of a large human body and a small mass of hair exposed to the same drug-containing environment. [Pg.242]

The first main need, in order to prioritize tasks related to handling spent nuclear fuel (SNF), remains information. If the information needed does not exist, there has to be funding to investigate and obtain that information. Then the information must be shared to be useful - not with the public, if that would create new security risks, but among all relevant parties doing work in this area. This is the only way to identify potential problems, whether they are bottlenecks, security concerns, potential political problems, or dangerous gaps. [Pg.240]


See other pages where Security concerns is mentioned: [Pg.791]    [Pg.109]    [Pg.171]    [Pg.12]    [Pg.15]    [Pg.240]    [Pg.266]    [Pg.616]    [Pg.619]    [Pg.160]    [Pg.222]    [Pg.224]    [Pg.272]    [Pg.127]    [Pg.105]    [Pg.45]    [Pg.3]    [Pg.19]    [Pg.52]    [Pg.294]    [Pg.26]    [Pg.28]    [Pg.25]    [Pg.32]    [Pg.35]    [Pg.44]    [Pg.171]    [Pg.112]   
See also in sourсe #XX -- [ Pg.128 , Pg.155 ]




SEARCH



© 2024 chempedia.info