Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Software security

Access to records at the primary and secondary repositories must be restricted and monitored through the system s software with its required logon, security procedures, and audit trail. If remote access is provided via external software, the applications must enter through the same protective security software as that used for local access. [Pg.194]

DISTeFAX was designed and implemented as a secure software system facilitating the processing of meta-faxes (multipart documents obtained from individual files generated by different applications like text editors, spread sheet processors, image processing applications, etc.)... [Pg.1284]

Failure to provide timely security software updates and patches to medical devices and networks and to address related vulnerabilities in older medical device models... [Pg.271]

Franke, N. and von Hippel, E. (2003), "Satisfying heterogeneous user needs via innovation toolkits The case of Apache security software, Research Poli(7, 32 (7], 1199-215. [Pg.183]

Considerable research is done in computer networking by smaller companies. Cisco leads in router research and many other areas, such as wireless access points, video-conferencing equipment, and network management software. Symantec and MacAfee develop a great deal of security software for networks. Google, Yahoo , and Microsoft spend millions every year on research and development to develop a better search engine. [Pg.422]

Web architecture has developed both in terms of providing convenience for consumer transactions and social networking sites, such as Facebook, and also in terms of providing security through the use of firewalls and new security software to try to prevent cyber crimes. Despite the security risks, the usage of the Internet for personal, financial, educational, and business-related activities is expected to increase, especially in many of the newly developing countries that have been lagging behind the United States and other developed nations. [Pg.1074]

The software industry contains many smaller but important companies. Symantec produces some important security software. Adobe Systems has a large... [Pg.1663]

In addition to the typical security features, such as password protection and directory access control supplied with most network operating systems, more sophisticated network security software/hardware is available for LANs. For instance, security software maybe added to workstations and or servers which will... [Pg.2129]

ARINC (2003) Avionics application software standard interface. ARINC Specification 653-1 ASSC (2010) Allied Standards Avionics Architecture Council. Avionics Systems Standardisation Committee website, http //assconline.co.uk/asaac.asp. Accessed 9 August 2010 Barnes J (2005) Safe and secure software - an invitation to Ada 2005. AdaCore. http //www. [Pg.231]

In a simple LOPA using a conservative approach, unless there is complete independence in how basic process control functions are implemented through the BPCS, no credit can be taken for any risk reduction provided by a control or alarm function implemented through the BPCS as a protection layer if a BPCS failure also forms part of an initiating event. However, this conservative approach may be relaxed if it can be demonstrated that there is sufficient independence to allow credit to be taken for both. This issue is discussed in Sections 9.4 and 9.5 of BS EN 61511-1 and BS EN 61511 -2. The reader is referred to these sources for a more detailed discussion. Systematic factors such as security, software, design errors and human factors should also be considered. [Pg.116]

In Section 5 we propose and discuss the concept of security modules a security software layer, to retrofit security in PROFINET lO and PROFIsafe without any changes in the transmission system or standards. If the risk of security threats is not negligible, security modules can be used to add a security layer between PROFINET lO and PROFIsafe to reduce the possibihties of security attacks, and increase the overall availability. In addition for the studied system, the security modules will not forward safety containers that indicate compromised integrity, thus not putting the system in fail-safe mode due to spurious attacks on safety containers. [Pg.79]

Mahmud, S.M., Shanker, S., Hossain, I. Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links. In Proceedings of the 2005 IEEE In-telUgent Vehicles Symposium, pp. 588 593 (2005)... [Pg.107]

Figure 1 shows a schematic of a modern-day purpose built computer in which the processor and memory chips responsible for executing application software and security software are separated by an Ethernet LAN. All of this logic would be housed in a single box which could be made as tamper resistant as desired. Its architecture, simplified so as not to overburden this discussion, nevertheless illustrates a number of important principles ... [Pg.249]

It is not possible for the applications software to modify the security software without its cooperation since its memory is not directly accessible from the applications processor. [Pg.250]

Other specific protocols for secure software download and firmware updates have also been proposed [6,7,8]. Yet, they only ensure secure distribution of software (i.e., data authenticity, data integrity, data confidentiality, non-repudiation, and data freshness) and do not address remote diagnostics and authorisation issues. [Pg.72]

Dubreuil, J., Bouffard, G., Lanet, J.L., Iguchy-Cartigny, J. Type classification against Fault Enabled Mutant in Java based Smart Card. In Sixth International Workshop on Secure Software Engineering (SecSE), pp. 551-556. Springer (2012)... [Pg.93]

On the rack, there is an encoding stub that has a dual role the first is to provide safe information, concerning the identity of the PA-Section of the unit, to the software applications of the UG-Section. The information also concerns the version of the secure software. Its second role is to enable the physical configuration of input/output networks where the PA-Section has several input/output trays. [Pg.59]

Software Necessary to develop secure software at ASIL A or B level... [Pg.374]

Security Application ion part of the security software Chapter 11... [Pg.482]


See other pages where Software security is mentioned: [Pg.1281]    [Pg.1281]    [Pg.461]    [Pg.184]    [Pg.294]    [Pg.78]    [Pg.105]    [Pg.375]    [Pg.305]    [Pg.19]   
See also in sourсe #XX -- [ Pg.79 , Pg.80 , Pg.123 , Pg.182 ]

See also in sourсe #XX -- [ Pg.222 ]




SEARCH



© 2024 chempedia.info