next up previous
Next: Safety Up: Hardware Controls Previous: Generic Workstation Software

Security

Requirement:

The task of security is to protect the subsystem against malicious or accidental actions. Excessive security tends to increase the over-head and increases the response time. It is important to build the right amount of security into the system. One important aspect of the security task is to insure that system parameters are not set to values that could damage the hardware. Another aspect is to avoid that parameters that can affect the quality of the data being changed while data are taken. Yet another aspect is to make sure two users cannot simultaneously change the parameter while setting the same hardware.

Requirement:

The system must have built-in robustness that protects hardware against parameters settings that could cause serious damage.

Justification:

Robutsness of a system reduces need for a tight security system.

Status:

Under discussion

Requirement:

Parameters that affect data recorded by the data acquisition should be well protected against changes by a ``lock-out'' system that cannot be broken without a major alarm being generated.

Justification:

This provides enough protection against accidental changes.

Status:

Under discussion

Requirement:

The subsystem configuration must be easy to restore.

Justification:

This requirement reduces the need for security.

Status:

Under discussion

Requirement:

The tagging should be granted to any user that wnats to work on the system.

Justification:

Eliminates unconscious interference of two users working on hte same subsystem.

Status:

Under discussion

Requirement:

The system security for the sun workstation should eliminate assaults by hackers.

Justification:

Justification of requirement

Status:

Under discussion

Requirement:

There should be a possibility for further securing selected controlled parameters by the use of passwords.

Justification:

Justification of requirement

Status:

Under discussion

Requirement:

The parameter database and configuration files should be well protected with passwords.

Justification:

Justification of requirement

Status:

Under discussion

Requirement:

Short statement of requirement

Justification:

Justification of requirement

Status:

Under discussion



next up previous
Next: Safety Up: Hardware Controls Previous: Generic Workstation Software



Claude Andre Pruneau
Thu Oct 12 18:01:54 EDT 1995