12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>t<strong>in</strong>g user profiles, manag<strong>in</strong>g cookies and filter<strong>in</strong>g content. Secure digitalsignatures and certificates are handled along with encryption for limit<strong>in</strong>g<strong>the</strong> amount of <strong>in</strong>formation revealed.There will be fur<strong>the</strong>r development of security architectures andapproaches by groups such as <strong>the</strong> World Wide Web Consortium’s Platformfor Privacy Preferences.Security levels are used to automate a user’s <strong>in</strong>teraction with Websites through compliant browsers, plug-<strong>in</strong>s, or servers. Intel has developed<strong>the</strong> Common Data Security Architecture (CDSA). This is a set ofapplication programm<strong>in</strong>g <strong>in</strong>terfaces (APIs) designed to make computerplatforms more secure.The growth of smart cards <strong>in</strong>dicates <strong>the</strong>ir acknowledgment as securitydevices. A smart card can be used with passwords or biometricdata to protect access to data. The digital identity is embedded <strong>in</strong> <strong>the</strong>chip on <strong>the</strong> card. In <strong>the</strong> future, those chips will be embedded <strong>in</strong> clo<strong>the</strong>sand perhaps eventually <strong>in</strong> our bodies.Public key encryption-based digital certificates now have limiteduse <strong>in</strong> browsers. These will become more common <strong>in</strong> <strong>the</strong> future. Theycan be used by almost any program and will be a feature of most smartcard identity systems.Au<strong>the</strong>ntication card software <strong>in</strong>cludes Security Dynamics SecureID program and freeware programs from Trip Wire, Crack, COPS andTCP Wrapper. IBM’s Keyworks is designed for public-key <strong>in</strong>frastructureservices <strong>in</strong>clud<strong>in</strong>g cryptography. Lotus Notes uses Keyworks. IBM alsohas its Network firewall for W<strong>in</strong>dows NT.Random Number GenerationRandom number generators provide results that may appear to berandom, but <strong>the</strong>y are actually pseudo-random numbers generated by acalculation such as <strong>the</strong> Lewis-Goodman-Miller generator. This meansthat over a period of time a pattern will emerge <strong>in</strong> <strong>the</strong> numbers that arecomputer picks. That can cause trouble when <strong>the</strong>se numbers are used <strong>in</strong>security schemes.Random numbers are fundamental to computer security, s<strong>in</strong>ce <strong>the</strong>yare used to generate security keys that prevent break<strong>in</strong>g <strong>in</strong>to on-l<strong>in</strong>esystems. Given enough time <strong>the</strong> <strong>in</strong>truder can trace a pattern and replicatea key.©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!