Security Resources Sample Clauses

Security Resources. The Parties’ may, upon mutual agreement, provide resources from its security group to assist with an identified Data Security Breach for the purpose of meeting its obligations in relation to the notification of a Data Security Breach under Applicable Laws or other notification obligations or requirements.
Security Resources. Dropbox provides the following Security Resources for these services: (a) the Dropbox Security Whitepaper available at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇.▇▇▇/static/business/resources/Security_Whitepaper.pdf; and
Security Resources. The next sections present three individual scenarios providing an example of each of the available security resource types. For each example, we choose to deploy the resource inside the ADS testbed. The newly created machine will be attached to the private network and OpenStack will provide a floating IP to reach the resource. In order to log on the machine, we provide our public SSH key. Below there are the yaml definition of the security resources available. 4.2.1. Example 1
Security Resources. A Security Resource is a commonly used security agent that the Experimenter can include in her experiment. She can access and configure it through a static initial configuration, included in the TOSCA description of the Resource, or, once deployed, through a REST interface that exposes its main services. The Experimenter can also ask the Security Resource to send its log messages to a remote log collector, which makes them available in a simple web page reserved to her. The Experimenter could easily access it through its web browser and check the behaviour of her all security agents, and to see some statistics. The Experimenter can get the Security Resource in two different formats:  As an agent directly installed in the VM that she wants to monitor. The system will provide her a script that the Experimenter has just to run inside the VM. It will be already configured as required in the TOSCA description of the resource. The output of the script will provide to the Experimenter information on how to access the deployed resource (URLs, etc.)  As a standalone VM the Security Resource will be deployed directly by the Security Manager in the testbed chosen by the Experimenter. The Security Manager will take care of the initial configuration of the resource. The Experimenter has to set up on her own the redirection of the network traffic that she wants to control through the Security Resource VM (by means of tunnelling or SDN capabilities). To date the only Security Resource available on the SoftFIRE environment is the firewall.
Security Resources. Security Resources regarding these Services are available at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/trust/security.

Related to Security Resources

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Password Security Any password we provide to you may be used only during the Term to access Seller Central (or other tools we provide) to use the Services, electronically accept Your Transactions, and review your completed Transactions. You are solely responsible for maintaining the security of your password. You may not disclose your password to any third party (other than third parties authorized by you to use your account or Seller Central in accordance with this Agreement) and are solely responsible for any use of or action taken under your password. If your password is compromised, you must immediately change your password.