Control system security

Results: 2384



#Item
81Ethernet / Network switch / Screw / Switch / Belt / Electrical wiring / Sheet / Railroad switch / Conveyor system

Material flow control MWM-1/5 Installation and operating instructions Principle: Before any work shall be carried out it has to be checked that the whole line is circuit-free and any specific and general security instruc

Add to Reading List

Source URL: duk.eu

Language: English - Date: 2006-01-26 08:22:08
82National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

Add to Reading List

Source URL: www.inguardians.com

Language: English - Date: 2016-08-05 14:35:56
83Computer security / Cryptography / Identity management / Computer network security / Security / Password / Information technology controls / Security controls / Access control

Security Strategy White Paper This white paper references Health Insurance Portability and Accounting Act () Security strategies that QSI clients may pursue to help conform their use of the system to meet the Security Pr

Add to Reading List

Source URL: www.qsii.com

Language: English - Date: 2014-01-28 14:18:07
84Spamming / Computer network security / Multi-agent systems / Domain name system / Botnets / Command and control / Rustock botnet / Name server / Email spam / OpenDNS / DNS sinkhole

On Botnets that use DNS for Command and Control Christian J. Dietrich‡∗ , Christian Rossow†∗ , Felix C. Freiling‡ , Norbert Pohlmann∗ †Computer Systems Group, Vrije Universiteit Amsterdam ‡Department of C

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:20:24
85Computer access control / Password / Security / Draw a Secret / Identity management / Cognitive password

The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright, Shannon Scielzo The University of Texas at Arli

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:56
86Access control / Computer security / Identity management / Perimeter security / Physical security / Usability / Password / Internet privacy / User / Privacy concerns with social networking services / Mobile security

Lessons Learned From the Deployment of a Smartphone-Based Access-Control System Lujo Bauer Lorrie Faith Cranor

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-31 14:34:10
87Domain name system / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Extension mechanisms for DNS / Name server / Transmission Control Protocol / Reverse DNS lookup / .arpa

Measuring the effects of DNSSEC deployment on query load Jelte Jansen∗ NLnet Labs May 1, 2006

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
88Black box / Computer security / Global Positioning System / GPS tracking unit / Blackbox

More than just a dot on the map. BlackBox Control asset tra flexibility of a customised location and reporting nee Welcome to control

Add to Reading List

Source URL: www.blackboxcontrol.com.au

Language: English - Date: 2014-02-12 07:56:25
89Access control / Doors / Computer security / Cryptography / National security / Von Duprin / Elevator / Card reader / Vehicle door / HID Global

CONSULTANT PROCEDURES & DESIGN GUIDELINESACCESS CONTROL SYSTEM MISSOURI S&T GENERAL:

Add to Reading List

Source URL: designconstruction.mst.edu

Language: English - Date: 2016-07-01 11:32:22
90Computer access control / Access control / Directory services / Federated identity / Distributed Common Ground System / Equipment of the United States Air Force / DCGS-A / XACML / Single sign-on / DCGS / Authentication / Active Directory

Identity and Access Management (IdAM) Security Framework for DCGS-Army The Distributed Common Ground System-Army (DCGS-Army) is a data system that supports field intelligence, surveillance information, and situational aw

Add to Reading List

Source URL: www.jerichosystems.com

Language: English - Date: 2016-02-10 13:54:31
UPDATE