Control system security

Results: 2384



#Item
161Nuclear proliferation / Nuclear weapons / International organizations / International trade / Export / Wassenaar Arrangement / International Traffic in Arms Regulations / Nuclear Non-Proliferation Treaty / Weapon of mass destruction / International relations / Law / Military technology

Japan’s Export Control System / Industry Seminar in the Philippines (Jan. 13, Japan’s Export Control System Office of International Affairs for Security Export Control, Trade and Economic Cooperation Bureau,

Add to Reading List

Source URL: supportoffice.jp

Language: English - Date: 2014-10-22 20:33:03
162Cyberwarfare / Cyber security standards / Invensys / Professional certification / Security / Computer security / Computer network security

The Achilles Certification Program Goes Mainstream July 15, 2009 Wurldtech Announces 14th Certified Control System & Program Expansion To Address Emerging Cyber Security Challenges Faced By Critical Infrastructure Indust

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
163Identity management / Password / System administration / Two-factor authentication / Identity management system / Password synchronization / Self-service password reset / Security / Computer security / Access control

Intragen Desktop Password Reset for Sun Microsystems Identity Manager Many customers suffer from the cost of large numbers of help desk calls due to forgotten passwords, not to mention the inconvenience to affected users

Add to Reading List

Source URL: www.intragen.com

Language: English - Date: 2011-03-14 07:51:06
164Technology / Cyber security standards / Cyberwarfare / Invensys / SCADA / Computer network security / Security / Computer security

Invensys I/A ZCP 270 Is Achilles Certified September 09, 2009 Wurldtech Announces 15th Industrial Control System To Achieve Internationally Recognized Benchmark For Cyber Security & Robustness Vancouver, BC, Canada — S

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
165Computer network security / Internet privacy / Privacy / Password / Vulnerability / Ethics / Computer security / Security

Poster: A Set of Privacy Preserving Requirements For Smart Home Control System Mobile Apps Sophia Hannah, Jonathan Ganz, Andy Applebaum, Matt Bishop and Karl Levitt Department of Computer Science University of California

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:48
166Smoke detector / Fire alarm control panel / Fire alarm system / CPD / Technology / Action / Active fire protection / Alarms / Detectors

Owner of certificate: Autronica Fire and Security AS Haakon VIIs gateTrondheim Norway

Add to Reading List

Source URL: www.dbicertification.dk

Language: English - Date: 2014-04-23 05:26:38
167Cybernetics / Science / Computer security / Control engineering / Hacking / Access control / Cyberwarfare / Controller / Control system / Technology / Security / Automation

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:47
168Evaluation / Computer network security / Standards / Hacking / Vulnerability / Certification / Software testing / Cyberwarfare / Computer security

The HIMA HIMax Is Achilles Certified! June 23, 2010 The Wurldtech certification team is pleased to announce the 20th Achilles certified industrial control system. The HIMax safety controller from HIMA has achieved the in

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:12
169Application programming interfaces / Communications protocol / Data transmission / Protocols / Monad / Distributed computing / Operating system / X Window System / Transmission Control Protocol / Computing / Software / Data

Poster: Contract Verification for Mobile Security Hannah Gommerstadt Frank Pfenning Limin Jia

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:44
170Remote desktop / Virtual Network Computing / Secure Shell / Password / Single sign-on / Remote Desktop Services / Telnet / One-time password / Terminal server / Computing / System software / Software

ACCESS CONTROL, SESSION RECORDING AND SUPERVISION of privileged users INSIDER THREAT MANAGEMENT • ENHANCED SECURITY ACCESS MANAGEMENT TO CRITICAL RESOURCES

Add to Reading List

Source URL: www.wallix.com

Language: English - Date: 2014-06-19 11:01:11
UPDATE