security system Articles

  • Securability for system of systems

    As the Department of Defense (DoD) pursues methods within the systems engineering process to combat potential information assurance (IA) vulnerabilities, a new paradigm is required. This paper introduces the concept of securability as a new ility to be considered within the systems life cycle. Alongside the traditional system ilities (i.e., reliability, maintainability, supportability, etc.), ...


    By Inderscience Publishers

  • Secure in quality

    ISO 9001 is the most important quality management system in use today. A company that holds ISO 9001 is telling its customers and the world that it has a top quality management system and is totally committed to quality products and services. Companies that go through the process find that profits increase thanks to opening up market opportunities. Also costs reduce due to improving efficiency. ...


    By IMSM Ltd

  • Water Distribution System Security Monitoring

    A water security instrument essentially needs to be able to detect potential contaminants in drinking water. Since a significant number of potential chemical contaminants are organic in nature, a water security monitoring instrument that can detect organic matter in water is perfect for this application. Real Tech has developed an instrument specifically designed for water security ...


    By Real Tech Inc.

  • Taxonomy of SCADA systems security testbeds

    Considerable research has focused on developing simulation environments to study the effects of cyber–attacks on supervisory control and data acquisition (SCADA) systems although a methodology to develop a SCADA security testbed is not yet available. This paper attempts to address the issue by presenting a reference model taken from the literature and classifying specific contributions on the ...


    By Inderscience Publishers

  • Security, ethics and electronic commerce systems: cybercrime and the need for information sharing security

    Electronic Commerce (EC) provides the gateway for an enterprise's employees, managers, customers (clients), and all trusted suppliers and Trading Partners (TPs) to access electronic data applications and all the information they need (Akoh, 2001). Information security can be defined as the means of protecting data and information systems from any unauthorised access, use, disclosure, modification ...


    By Inderscience Publishers

  • Pathogen security: the illusion of security in foreign policy and biodefence

    'Pathogen security' (sometimes called 'biosecurity') is too often seen as the primary strategy to combat bioterrorism. Asserting that materials, technologies and expertise for bioterrorism are available worldwide and that terrorist groups are increasingly able to obtain and disseminate infectious disease pathogens, advocates contend that pathogen security systems and practices are central to ...


    By Inderscience Publishers

  • Designing and evaluating layered security

    Following systems engineering principles, we introduce analytic means to qualitatively judge and quantitatively assess layering of security controls with the aim of optimising risk reduction. The emphasis is on evaluating security controls in real world systems, where complications such as uncertainty, scale, multiple threats, multiple events, and multiple pathways from threat to event to ...


    By Inderscience Publishers

  • GuideKeeper security concept of operation

    GuideKeeper aims at defining the Security Concept of Operation (SECOP) and promoting the deployment in Europe of open architecture platforms for the use of Unmanned Aerial Vehicles (UAVs) for border surveillance. Several UAV system concepts will be considered. Of particular interest to the GuideKeeper project will be a High Altitude Platform Security Surveillance Tower (HAP Tower) with real-time ...


    By Inderscience Publishers

  • MacMachinery Secure Partnership with Sennebogen

    Despite the current economic climate Irish Company, Mac Machinery Limited, secures a partnership with German Enterprise Sennebogen (specialist in material handling solutions). The deal had been agreed in late 2009 and all parties are looking forward to working together to provide clients with a cost effective solution. Mac Machinery Marketing Manager, Annemarie Doohan, says that “you cannot stand ...


    By Mac Machinery Limited

  • A socio-organisational approach to information systems security risks

    The investigation in this paper takes a socio-organisational approach to information systems security management and proposes a framework which illustrates three important issues in the process of security goal setting. These are: trust, culture and risk communication. Three case studies show evidence that there is a chain reaction among these issues with a subsequent effect on the level of ...


    By Inderscience Publishers

  • Food security: Facts and figures

    Food security is deeply connected to other development challenges and poor health. Michael Hoevel traces the links. Food security addresses one of humankind’s most fundamental needs — access to a nutritious and adequate diet. It is also seen ...


    By SciDev.Net

  • Redefining Security for the 21st Century

    By Lester R. Brown One of our legacies from the last century, which was dominated by two world wars and the cold war, is a sense of security that is defined almost exclusively in military terms. It so dominates Washington thinking that the U.S. foreign affairs budget of $701 billion in 2009 consisted of $661 billion for military purposes and $40 billion for foreign assistance and diplomatic ...


    By Earth Policy Institute

  • Training programmes for the systems approach to nuclear security

    In support of the US Government and the International Atomic Energy Agency (IAEA) Nuclear Security Programmes, Sandia National Laboratories (SNL) has advocated and practised a risk-based, systematic approach to nuclear security. The risk equation has been implemented as the basis for a performance methodology for the design and evaluation of Physical Protection Systems against a Design Basis ...


    By Inderscience Publishers

  • SeReCon: a secure reconfiguration controller for self-reconfigurable systems

    A risk of covert insertion of circuitry into reconfigurable computing (RC) systems exists. This paper reviews risks of hardware attack on field programmable gate array (FPGA)-based RC systems and proposes a method for secure system credentials generation (unique, random and partially anonymous) and trusted self-reconfiguration, using a secure reconfiguration controller (SeReCon) and partial ...


    By Inderscience Publishers

  • System of systems engineering for border security and immigration: methodologies, processes and tools

    The purpose of this paper is to examine the nature and utility of methodology, methods and tools to support performance of system of systems engineering (SoSE). To achieve this purpose, three primary objectives will be pursued: 1) establish the critical issues in SoSE that impact the selection, deployment and development of supportive methodologies, methods and tools; 2) identify and assess ...


    By Inderscience Publishers

  • Homeland Security for Drinking Water Supplies

    As it has done with other jurisdictions, Congress has recently passed legislation aimed at protecting our nation's drinking water resources. Historically, water supply protection has been a high priority, including reservoir protection, continuous monitoring, and secure and redundant facilities to ensure an uninterrupted supply of drinking water. The Clean Water Act (1972), requires pollution ...


    By AECOM

  • Department of Homeland Security publishes list of chemicals for security rule

    On November 1st The Department of Homeland Security (DHS) posted on the Internet (www.dhs.gov) a Final Rule and Matrix List (Appendix A) identifying chemicals of interest (COI) that define coverage pursuant to Section 550 of the Homeland Security Appropriations Act of 2007 (Section 550). The rule was also published in the Federal Register on November 20th. This Final Rule establishes three ...

  • Strategic security measures for water infrastructure

    As the 10th anniversary of the September 11, 2001 (9/11) attacks is fast approaching, the United States (U.S.) has no definite information of terror threat.  According to the systematic approaches of risk assessment and concise intelligence analysis presented in the book entitled, "Risk Assessment for Water Infrastructure Safety and Security" (hereafter, the "RAWISS book"), the terrorists ...


    By IWA Publishing

  • Emergent information security in critical infrastructures

    The growing tendency to inter-weaving infrastructures makes them more complex, less manageable, and more vulnerable to random system failures. Several information systems are usually added to manage and control such infrastructures. However, in this internet era these information infrastructures have increasingly become the targets of sophisticated (denial of service) attacks, which cause random ...


    By Inderscience Publishers

Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you