Building a SECURE

نویسنده

  • Federico Caniato
چکیده

A re you gambling with your supply network? As we look back on supply chain management pre-Sept. 11, 2001, it's fair to say that many companies were indeed unwittingly gambling. Sadly, it took the terrorist attacks and subsequent reactions to expose a cold reality: The supply network is inherently vulnerable to disruption, and the failure of any one element in it could cause the whole network to fail. Further, the attacks dramatically illustrated the interdependence that exists in the supply network—not just among the trading partners but also with the U.S. government agencies involved in the flow of goods and the transportation infrastructure. This new operating environment calls for a supply network design that is both secure and resilient. That means a supply network that has advanced security processes and procedures in place, while at the same time being resilient enough to respond to unexpected disruptions and James B. Rice, Jr. is director of the Integrated Supply Chain Management program at the Massachusetts Institute of Technology (MIT). Federico Caniato, a doctoral candidate at Politecnico di Milano in Italy, was recently a visiting student at MIT.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Control Applications in Smart Homes and Buildings

With today’s ongoing integration of heterogeneous building automation systems, increased comfort, energy efficiency, improved building management, sustainability as well as advanced applications such as active & assisted living scenarios become possible. These smart homes and buildings are implemented as decentralized systems, where embedded devices are connected via networks to exchange their ...

متن کامل

Software security requirements in building automation

With today’s ongoing integration of heterogeneous building automation systems, increased comfort, energy efficiency, improved building management, sustainability as well as advanced applications such as active & assisted living scenarios become possible. Obviously, the demands – especially regarding security – increase: Secure communication becomes equally important as secure software being exe...

متن کامل

تغییرکاربری تطبیقی میراث صنعتی، الگویی برای خلق فرصت‌های جدید درون شهرها

The concept of industrial heritage arose in the middle of 20th century, when several industrial buildings and urban landscapes were destroyed in the UK. Since then, numerous efforts have been put to recognize industrial heritage works. Industrial sites are considered as a milestone in human history; they contain memories from a period which was a nuisance, and at the same time symbolized hope t...

متن کامل

Increasing security and availability in KNX networks

Buildings contain a number of technical systems in order to be able to fulfill their task of providing a comfortable, secure and safe environment. Apart from heating, ventilation and airconditioning as well as lighting and shading, critical services such as fire alarm or access control systems are added to building automation. The latter services require secure communication and high availabili...

متن کامل

A Robust Implementation of a Building Resources Access Rights Management System

A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a ...

متن کامل

Leveraging attestation techniques for trust establishment in distributed systems

English) As the complexity of current software systems increases, we see a correlative increase in the number of discovered vulnerabilities. These vulnerabilities, once exploited, allow an attacker to surreptitiously install subversive programs, such as malware and spyware, that can eavesdrop, record and distribute a user’s actions, passwords, credit card information, bids in auctions or other ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003