Explore chapters and articles related to this topic
SECURE CONFIGURATION MANAGEMENT
Published in James A. Scholz, Enterprise Architecture and Information Assurance, 2013
management process and how to develop a secure configuration management plan. Both terms are used interchangeably; it is the act of performing configuration management using and keeping security as your basis of decision making and portfolio management. An information system is typically in a constant state of change in response to new, enhanced, corrected, or updated hardware and software capabilities, patches for correcting software flaws and other errors to existing components, new security threats, changing business functions, etc. Implementing information system changes almost always results in some adjustment to the system configuration. To ensure that the required adjustments to the system configuration do not adversely affect the security of the information system or the organization from operation of the information system, a well-defined configuration management process that integrates information security is needed. Organizations apply security configuration management for establishing baselines and for tracking, controlling, and managing many aspects of business development and operation (e.g., products, services, manufacturing, business processes, and information technology). Organizations with a robust and effective SCM process need to consider information security implications with respect to the development and operation of information systems, including hardware, software, applications, and documentation. Effective SCM of information systems requires the integration of the management of secure configurations into the organizational SCM process or processes. For this reason, this chapter assumes that information security is an integral part of an organization's overall SCM process; however, the focus of this chapter is on implementation of the information system security aspects of SCM, and as such the term security-focused configuration management (SCM) is used to emphasize the concentration on information security. Though both IT business application functions and security-focused practices are expected to be integrated as a single process, SCM in this context is defined as the management and control of configurations for information systems to enable security and facilitate the management of information security risk within the business processes and complement the business model by protecting those systems that build the infrastructure.
Choosing the system configuration for high-volume manufacturing
Published in International Journal of Production Research, 2018
Yoram Koren, Xi Gu, Weihong Guo
The design of modern manufacturing systems should consider multiple objectives: minimising equipment capital cost, maximising productivity, responding rapidly to changing market demand, providing high-quality products and minimising performance loss when disruptive events occur. Large manufacturing systems can be configured in several different ways, depending on (1) the way that the machines are arranged in the production stages, and (2) the way that the machines are connected to transfer the part between them (by material transport systems, such as conveyors or overhead gantries) (Koren 2010). The choice of the system configuration is a critical decision at the system design stage, as it will impact the system performance during the entire system lifetime – the next 20–25 years.
GMMSO: game model-combined improved moth search optimization approach for reconfigurable asymmetric multi-processor system-on-chip architecture
Published in Engineering Optimization, 2023
Isaivani Mariyappan, Malathi Veluchamy
Very large-scale integration (VLSI) circuits are becoming more sophisticated day by day, and the multi-processor system-on-chip (MPSoC) is one such technology in advanced VLSI systems. In general, the MPSoC architecture embodies numerous processing elements and essential system components for the specific application to carry out the demands of embedded applications (Wolf, Jerraya, and Martin 2008). Tailoring the computational platform based on the specific requirements would reduce the complications in the VLSI area, and this can be achieved by implementing heterogeneous MPSoCs and specialized hardware accelerators (HWAs). Such accelerators take advantage of the parallelism property of particular applications and thus expedite the execution of defined tasks better than any general-purpose system architecture. The field programmable gate array (FPGA) is a developing technology that sets out an incredibly flexible platform through its superior reconfigurable ability. Owing to the generous capacity of FPGAs, the complete MPSoC circuit is implemented in a single FPGA device (Ma, Huang, and Andrews 2012). The asymmetric heterogeneous multi-processor systems-on-chip (AHt-MPSoC) configuration ensures the effective exploitation of hardware resources to deliver superior performance while consuming less power. Nevertheless, their usage leads to a larger design space of various possible system arrangements, which ultimately necessitates an appropriate design space exploration (DSE) tool to identify the best configuration based on application needs. The optimization of resource utilization becomes a crucial process in the system configuration, which can be achieved by applying optimization algorithms.
Security framework for dynamic service-oriented IT systems
Published in Journal of Information and Telecommunication, 2018
Grzegorz Kołaczek, Jolanta Mizera-Pietraszko
Analysis of the current system configuration starts from defining a set of threats and a set of security countermeasures. Then, defined is a mapping of the security countermeasures in relation to the set of the recognized threats. The final step in the process of the security level evaluation is to conduct a formal verification of the correctness of the implementation of the methods used in order to protect the system.