Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security techniques

In chemical industry infrastructure security, protection in depth is used to describe a layered security approach. A protection-in-depth strategy uses several forms of security techniques and/or devices against an intruder and does not rely on one single defensive mechanism to protect infrastructure. By implementing multiple layers of security, a hole or flaw in one layer is covered by the other layers. An intruder will have to intrude through each layer without being detected in the process—the layered approach implies that no matter how an intruder attempts to accomplish his goal, he will encounter effective elements of the physical protection system. [Pg.155]

ISO/IEC 15408-1, Information Technology—Security techniques—Introduction and general model (Common Criteria Part T). [Pg.23]

ISO/IEC 15408-2, Information Technology—Security techniques—Security functional requirements (Common Criteria Part 2). [Pg.23]

ISO/IEC DTR 15446, Information Technology—Security Techniques—Guide for the Production of Protection Profdes and Security Targets. [Pg.23]

The list is by no means complete, but it does represent a view of gross environmental problems accumulated from the past. Moreover, the over-polluted regions and the working environment with underdeveloped technology, unhealthy conditions, and bad security techniques makes the problem more complex. [Pg.228]

International Organization for Standardization. 2005. ISO/IEC 27001. Information technology. Security techniques, Information security management systems. Requirements, www.iso.org. ISBN 0451621298. [Pg.1025]

ISO (2005). Information technology - Security techniques Code of practice for information security management (ISO/IEC 27002 2005). [Pg.1883]

Urdaneta, G., Pierre, G., van Steen, M. A survey of DHT security techniques. ACM Computing Surveys, http //www.globule.org/publi/SDST acmcs2009.html (to appear)... [Pg.178]

ISO/IEC 27001 2005, Information Technology - Security Techniques - Information Security Management Systems - Requirements. [Pg.103]

ISO/IEC 27005, Information technology — Security techniques — Information security risk management. International Organization for Standardization (ISO), International Electrotechnical Commission, lEC (2008)... [Pg.190]

ISO 15408, 2009 Information technology - Security techniques - Evaluation criteria for IT security... [Pg.191]

ISO/IEC DIS 27039 Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems (IDPS) (July 2013) VDI/VDE 3699 Blatt 5 Process control with screens - Alarms/messages (German Draft) (May 2013)... [Pg.299]

Information technology security techniques information security management systems overview and vocabulary. Technical report, ISO/IEC (2014)... [Pg.244]

In this paper we will describe a number of security techniques. These techniques were not developed at the same time, nor were they developed in a systematic manner, although we will present them as if they were. However, it is useful to know something of the chronological order of development, at least to gain some sense of where the world of security engineering is going. To this end we will first give a brief account of the history of computer security evolution. [Pg.246]

The establishment of a floating-point computation in a security function requires the implementation of a security technique. The introduction of a partial redundancy of the floating-point computation requires a diversity, which might, for example, use different libraries. Therefore, it is necessary to accept certain errors during comparison. [Pg.19]

Partitioning is a security technique that is highly recommended by the automobile sector. The current version (not finalized) of standard ISO 26262 [ISO 09] introduced the basic opemtion of this technique (see Figure 1.39). [Pg.44]


See other pages where Security techniques is mentioned: [Pg.6]    [Pg.154]    [Pg.324]    [Pg.2139]    [Pg.201]    [Pg.746]    [Pg.747]    [Pg.80]    [Pg.1050]    [Pg.246]    [Pg.246]   


SEARCH



© 2024 chempedia.info