Occupational Health and Safety Risks in the Healthcare Sector

Total Page:16

File Type:pdf, Size:1020Kb

Occupational Health and Safety Risks in the Healthcare Sector Occupational health and safety risks in the healthcare sector Guide to prevention and good practice This publication is supported by the European Union Programme for Employment and Social Solidarity - PROGRESS (2007-2013). This programme is implemented by the European Commission. It was established to financially support the implementation of the objectives of the European Union in the employment, social affairs and equal oppor- tunities area, and thereby contribute to the achievement of the Europe 2020 Strategy goals in these fields. The seven-year Programme targets all stakeholders who can help shape the development of appropriate and effective employment and social legislation and policies, across the EU-27, EFTA-EEA and EU candidate and pre-candidate countries. For more information see: http://ec.europa.eu/progress Occupational health and safety risks in the healthcare sector European Commission Directorate-General for Employment, Social Affairs and Inclusion Unit B.3 Manuscript completed in December 2010 Neither the European Commission nor any person acting on behalf of the Commission may be held responsible for the use that may be made of the information contained in this publication. © Cover photos: iStock For any use or reproduction of photos which are not under European Union copyright, permission must be sought directly from the copyright holder(s). This guide has been produced by the Bundesanstalt für Arbeitsschutz und Arbeitsmedizin (BAuA), Berufsgenossenschaft für Gesundheitsdienst und Wohlfahrtspflege (BGW), contec Gesellschaft für Organisationsentwicklung mbH, Deutsches Netz Gesundheitsfördernder Krankenhäuser (DNGfK) and BAD/ Team Prevent GmbH. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) Certain mobile telephone operators do not allow access to 00 800 numbers or these calls may be billed. More information on the European Union is available on the Internet (http://europa.eu). Cataloguing data as well as an abstract can be found at the end of this publication. Luxembourg: Publications Office of the European Union, 2011 ISBN 978-92-79-19454-2 doi:10.2767/27263 © European Union, 2011 Reproduction is authorised provided the source is acknowledged. Printed in Luxembourg PRINTED ON ELEMENTAL CHLORINE-FREE BLEACHED PAPER (ECF) Contents Preamble 7 Introduction and vision 11 1. Prevention and health promotion as a management task 13 Description of good company practice 21 2. How to carry out a risk assessment 23 2.1. Introduction 24 2.2. Roles and responsibilities 24 2.3. What should be considered before I start the risk assessment 28 2.4. How do I get started with the risk assessment? 28 2.5. Inclusion of gender aspects in the risk assessment 34 2.6. Description of good company practice 35 2.7. Links 40 2.8. Relevant European Union directives 43 2.9. OiRA: Online risk assessment tool, EU-OSHA 43 2.10. Literature 43 2.11. Example of a risk assessment based on the task of manually handling patients 44 2.12. Example of a risk assessment based on the task of surface disinfection 45 3. Biological risks 49 3.1. Introduction 50 3.2. General risk assessment of potential occupational exposure to infection 51 3.3. Special risk assessment of biological risks 69 3.3.1. Risk of blood-borne infections 69 3.3.2. Risk of airborne infection 80 3.3.3. Risk of direct and indirect contact infection 84 3.3.4. Description of good company practice: 88 - handling contact infections - preventive measures in the ambulance service 90 3.3.5. Special infections 92 3 3.4. Pregnancy 101 3.5. Relevant European Union directives 102 3.6. Links 103 3.7. Literature 105 4. Musculoskeletal risks 107 4.1. Risks for the development of musculoskeletal disorders 108 4.1.1. Introduction 108 4.1.2. Nature of the risk 109 4.1.3. Basic criteria for a specific risk assessment for the prevention of MSDs 111 4.1.4. Work situations with the greatest exposure 116 4.1.5. Effects on health and safety 121 4.1.6. Preventive and protective measures 124 4.1.7. Behaviour in critical situations — Recommendations for workers 132 4.1.8. Main messages and conclusions 136 4.1.9. Relevant European Union directives 137 4.1.10. Description of good company practice 139 4.1.11. Links 151 4.1.12. Literature 156 4.2. Prevention of accidents due to slips, trips and falls (85) 157 4.2.1. Introduction 157 4.2.2. Nature of the risk 158 4.2.3. Basic criteria for a specific risk assessment for the prevention of slip, trip and fall accidents 159 4.2.4. Work situations with the greatest exposure 160 4.2.5. Effects on health and safety 161 4.2.6. Preventive and protective measures 161 4.2.7. Personal protective equipment 164 4.2.8. Behaviour in critical situations — Recommendations for workers 166 4.2.9. Main messages and conclusion 166 4.2.10. Relevant European Union directives 166 4.2.11. Links 168 4.2.12. Literature 170 5. Psychosocial risks 171 5.1. Introduction 172 5.2. Stress and burnout 176 5.2.1. Nature of risk dealt with 176 5.2.2. Basic criteria for a specific risk assessment 176 5.2.3. Work situations with the greatest exposure 182 4 5.2.4. Effects on health and safety 182 5.2.5. General preventive and protective measures 183 5.2.6. Description of specific preventive techniques and procedures 184 5.3. Prevention and monitoring of violence and mobbing (bullying and harassment) at the workplace 186 5.3.1. Nature of the risk dealt with 186 5.3.2. Basic criteria for a specific risk assessment 188 5.3.3. Work situations with the greatest exposure 192 5.3.4. Effects on health and safety 192 5.3.5. General preventive and protective measures 193 5.3.6. Description of the specific preventive techniques and procedures 194 5.3.7. Examples of good corporate practice 194 5.3.8. Appropriate modes of behaviour in critical situations 194 5.3.9. Most important knowledge and conclusions 195 5.4. Working hours 196 5.4.1. Nature of risk dealt with 196 5.4.2. Basic criteria for a specific risk assessment 196 5.4.3. Description of the work situations with the greatest exposure 198 5.4.4. Descriptions of the effects on health and safety 198 5.4.5. General preventive and protective measures 200 5.4.6. Description of the specific preventive techniques and procedures 201 5.4.7. Examples of good corporate practice 201 5.4.8. Appropriate modes of behaviour in critical situations 202 5.4.9. Most important knowledge and conclusion 202 5.5. Drug abuse 203 5.5.1. Nature of the risk dealt with 203 5.5.2. Basic criteria for a specific risk assessment 203 5.5.3. Work situations with the greatest exposure 205 5.5.4. Effects on health and safety 205 5.5.5. General preventive and protective measures 205 5.5.6. Specific preventive techniques and procedures 205 5.5.7. Appropriate modes of behaviour in critical situations 206 5.5.8. Most important knowledge and conclusions 207 5.6. Relevant European Union directives 208 5.7. Description of good company practice 209 5.7.1. Interview with Havelland Clinics, Nauen, on psychosocial risks 209 5.7.2. Interview with St Elisabeth Hospital, Tilburg, on psychosocial risks 211 5.8. Links 213 5.9. Literature 215 Annex 217 5 6. Chemical risks 219 6.1. Introduction 220 6.2. Nature of the risk dealt with: Special risks attributed to dangerous substances and preparations 221 6.3. Basic criteria for assessing chemical risks 221 6.3.1. Risk assessment 225 6.4. General preventive and protective measures (135)(136): Implementation of protective measures taking into account the risk assessment 227 6.4.1. Protective measures (137)(138) 227 6.4.2. Provision of information/instruction to workers 229 6.4.3. Monitoring the effectiveness of measures 230 6.5. Cleaning and disinfection work 230 6.5.1. Descriptions of the work situations with the greatest exposure 231 6.5.2. Description of the effect on health and safety 232 6.5.3. Specific preventive techniques and procedures 233 6.6. Cytostatic/cytotoxic drugs 234 6.6.1. Description of the work situations with the greatest exposure 234 6.6.2. Description of the effect on health and safety 236 6.6.3. Specific prevention techniques and procedures 236 6.7. Activities involving anaesthetic gases 241 6.7.1. Description of work with maximum exposure 242 6.7.2. Description of the effect on health and safety 242 6.7.3. Specific prevention techniques and procedures 244 6.8. Activities involving substances which endanger reproduction 247 6.9. Relevant European Union directives 250 6.10. Description of good company practice 251 6.10.1. Interview with General Hospital Vienna (AKH Vienna) on safe working in disinfection activities 251 6.10.2. Working safely with cytostatic drugs 254 6.11. Links 258 6.12. Literature 263 Imprint 265 Annexes 269 6 Preamble OccupaTional healTH and SAFETY risKS in The healThcare secTor About 10 % of workers in the European Union belong to the health and welfare sector, and many of them work in hospitals. These workers may be exposed to a very wide variety of risks. EU legislation on health and safety at work currently covers most of these risks — nevertheless, the combination of such diverse risks arising at the same time and the fact that this is clearly a high-risk sector have given rise to a debate on the need for a specific approach in order to improve the protection of the health and safety of hospital personnel at Union level.
Recommended publications
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • Rights Reserved. Permission to Make Digital Or Hard Copies of All Or Part Of
    Copyright © 1994, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 Microsoft Windows NT And The Competition for Desktop Computing January 1994 Department ofElectrical Engineering and Computer Sciences University ofCalifornia Berkeley, California 94720 Abstract This report contains two papers, An Introduction to Microsoft Windows NT And Its Competitors, and The Status ofWindows NT and Its Competitors At The End of1993. The first paper, written in April 1993,presents an overview of the technology of Windows NT, and analyzes the competitors and competitive factors in the desktop operating system race.
    [Show full text]
  • Integrated Report 2019
    Integrated Report 2019 JP TOWER, 2-7-2 Marunouchi, Chiyoda-ku, Tokyo 100-7015, Japan Phone: +81-3-6250-2111 https://konicaminolta.com CONTENTS On the Release of Integrated Report 2019 1 On the Release of Integrated Report 2019 2 CONTENTS Konica Minolta’s Strengths 03 Since fiscal 2015, Konica Minolta has released annual reports (the name of these reports was changed to the and Value Creation 3 Konica Minolta Philosophy integrated report in 2017) that provide a comprehensive look at the Company's activities and philosophies. 7 Value Creation Process The fifth report is now available. We made this integrated report to be a communication tool to better 9 Konica Minolta's Strengths 1. Customer base familiarize stakeholders, including shareholders and investors, with Konica Minolta by systematically 11 Konica Minolta’s Strengths 2. Technical expertise organizing both financial and non-financial information. 13 Konica Minolta’s Strengths 3. Business Model The 2018 integrated report was externally well-received, winning recognition and awards that included Growth Strategy 15 the Special Award in the Nikkei Annual Report Awards conducted by Nikkei Inc., and the Excellence in 15 Medium Term Business Plan Integrated Reporting Prize at the 6th WICI Japan Awards for Excellence in Integrated Reporting. 17 Message from the CEO Integrated Report 2019 clarifies the Konica Minolta Group's strengths and value creation processes 25 Message from the CFO 29 while explaining the Group's medium- to long-term business strategy and pathway to value creation with a Special Topics Building High Value-Added Businesses focus on SHINKA 2019, the new Medium Term Business Plan formulated in 2017.
    [Show full text]
  • This Is a Fairy Tale •.• NOT! a Primer on Moving SAS® Applications
    This is a Fairy Tale•.• NOT! A Primer on Moving SAS® Applications Across Graphical Operating Systems James Hefner, Entergy Corporation, Beaumont, TX lineup. The PowerPC's PowerOpen operating system should be ABSTRACT able to run Windows, Windows NT, OS/2, Macintosh, and UNIX applications unmodified (using SoftPC to run Windows & OS/2 Currently, most SAS Software application developers have on~ apps). Current plans are to offer these new machines at prices one or two graphical operating systems (such as Microsoft that are highly competitive with the current top-of-the-!ine WindowsTN, or OSFlMoti~ to support. However, the pending offerings by IBM PC manufacturerS and Apple, nol 10 mention release of the SAS System for the Apple® Macintosh®I and the UNIX workstations. This could mean a change in the platform you introduction of new hardware and software such as the PowerPC are currently using, as well as the ability (or need) to be able to and Wabi, means that application developers may have to use and write applications using any of the five operating support two or more graphical operating systems. systems. This paper is intended to assist application developers, both in New Graphical Operating Systems the teaching of the fundamentals of graphical operating systems, and in Ihe moving of SAS/Af® and SAS/EIS® applicalions from In addition to the platforms mentioned above, Apple and IBM are one operating system to another. currently working on the Taligent operating system, which will have an object-oriented, graphical front end. IBM is also INTRODUCTION discussing porling its object·orienled 0512 2.x Workplace Shell 10 a new ver.sion of PC DOS® and AIX®, IBM's version of UNIX (to If you are a SAS' application developer, you may currently be be called Workplace OS).
    [Show full text]
  • Microkernel-Based Operating Systems - Introduction
    Faculty of Computer Science Institute for System Architecture, Operating Systems Group Microkernel-based Operating Systems - Introduction Björn Döbel Dresden, Oct 12th 2010 Lecture Goals • Provide deeper understanding of OS mechanisms • Illustrate alternative design concepts • Promote OS research at TU Dresden • Make you all enthusiastic about OS development in general and microkernels in special TU Dresden, 2010-10-12 MOS - Introduction Slide 2 von 41 Administration - Lecture • Lecture every Tuesday, 1:00 PM, INF/E08 • Slides: http://www.tudos.org -> Teaching -> Microkernel-based Operating Systems • Subscribe to our mailing list: http://os.inf.tu-dresden.de/mailman/listinfo/mos2010 • This lecture is not: Microkernel construction (in summer term) TU Dresden, 2010-10-12 MOS - Introduction Slide 3 von 41 Administration - Exercises • Exercises (roughly) bi-weekly, Tuesday, 2:50 PM, INF/E08 • Practical exercises in the computer lab • Paper reading exercises – Read a paper beforehand. – Sum it up and prepare 3 questions. – We expect you to actively participate in discussion. • First exercise: next week – Brinch-Hansen: Nucleus of a multiprogramming system TU Dresden, 2010-10-12 MOS - Introduction Slide 4 von 41 Complex lab • Complex lab in parallel to lecture • Build several components of an OS • “Komplexpraktikum” for (Media) Computer Science students • “Internship” for Computational Engineering • starts on Tuesday, Oct 26th, 14:50 TU Dresden, 2010-10-12 MOS - Introduction Slide 5 von 41 Schedule Date Lecture Exercise Oct 12 Intro Oct 19 Tasks, Threads, Synchronization Paper: Nucleus of an MP system Oct 26 Memory Nov 2 Communication Practical: Booting Nov 9 Real-Time Nov 16 Device Drivers Paper: Singularity OS Nov 23 Nov 30 Resource Management Practical: IPC Dec 7 Virtualization Dec 14 Legacy Containers Paper: Formal req.
    [Show full text]
  • L4 Microkernel
    10 Years L4-Based Systems L4/Nizza Secure-System Architecture TU Dresden Operating Hermann Härtig Systems Group et al. mult. 10 Years Your Passwords, Secrets, ... L4-Based Your Passwords, Secrets, ... Systems applet Linux App Firefox jvm X11 source: Linux Understanding Data Lifetime via Hermann Härtig Whole System Simulation et al. Jim Chow, Ben Pfaff, Tal mult. Garfinkel, Kevin Christopher, TU and Mendel Rosenblum, Dresden Operating keyboard Stanford University Systems Usenix Security 04 Group 2 SEVECOM Budapest 2006 10 Years Outline L4-Based Outline Systems L4 etc . the microkernel vision . early experience: MACH etc . what is L4 ? . L4 and legacy: L4Linux and DDE . DROPS: L4 and Real-Time . L4Env: a multi-server environment for L4 apps Hermann . major L4 projects Härtig et al. mult. TU L4/Nizza Secure System Architecture Dresden Operating What's Up Next? Systems Group Conclusion 3 SEVECOM Budapest 2006 Microkernels - 10 Years Microkernels - L4-Based vision and earlier experience Systems vision and earlier experience . monolithic systems – large – complex – hard to add real-time – large trusted computing bases Applications Applications User Applications – new additional Mode components often crash system Privileged File Network Kernel Hermann Systems Stacks Härtig Mode et al. Memory Processe mult. Manage Drivers s ment TU Dresden Monolithic Operating Operating System Systems Group Hardware 4 SEVECOM Budapest 2006 10 Years The Microkernel Vision L4-Based The Microkernel Vision Systems . small operating system kernel – kernel-mode action less error prone – allows strict validation . system services implemented as user-level servers with their own address spaces – flexibility – extensibility – customizable Hermann . more robust systems Härtig et al. – protected individual system components (e.g., drivers) mult.
    [Show full text]
  • The Europeanisation of Occupational Health Services
    Kannen kuva: Nanna Susi: Sateenkaaren tuolla puolen The Europanisation of occupational health services: A study of the impact of EU policies Riitta-Maija Hämäläinen People and Work Research Reports 82 Finnish Institute of Occupational Health Helsinki, Finland 2 CONTENTS ABSTRACT ................................................................. 11 1. INTRODUCTION ..................................................... 14 2. POLICY PROCESSES AND POLICY ANALYSIS .................. 19 2.1 Process of policy-making ....................................... 19 2.2 Theoretical frameworks for analysis of policy processes ................................................... 21 2.3 Policy processes for OHS ....................................... 23 3. RESEARCH TASKS, AIMS, AND ANCHORAGE .................. 27 4. STUDY DESIGN, DATA COLLECTION, AND ANALYSIS ....... 29 4.1 Qualitative comparative study of OHS ..................... 31 4.2 Collection of data ................................................. 35 4.2.1 Literature and document analysis ................... 38 4.2.2 Interviews .................................................. 39 4.3 Processing and analysing qualitative data ................ 42 4.3.1 Evidence-building in comparative multiple case study ...................................... 44 4.3.2 Analysing evidence in the multiple case study .. 46 5. THE POLICY ENVIRONMENT OF OHS ............................. 48 5.1 Contributions of the ILO and WHO to OHS ............... 48 5.2 Policy-making process within EU ............................. 54
    [Show full text]
  • Operating System Structure
    Operating System Structure Joey Echeverria [email protected] modified by: Matthew Brewer [email protected] rampaged through by: Dave Eckhardt [email protected] December 5, 2007 Carnegie Mellon University: 15-410 Fall 2007 Synchronization • P4 - due tonight • Homework 2 - out today, due Friday night • Book report - due Friday night (late days are possible) • Friday lecture - exam review • Exam - room change in progress; discard any cached values Carnegie Mellon University: 15-410 Fall 2007 1 Outline • OS responsibility checklist • Kernel structures – Monolithic kernels ∗ Kernel extensions – Open systems – Microkernels – Provable kernel extensions – Exokernels – More microkernels • Final thoughts Carnegie Mellon University: 15-410 Fall 2007 2 OS Responsibility Checklist • It’s not so easy to be an OS: 1. Protection boundaries 2. Abstraction layers 3. Hardware multiplexers Carnegie Mellon University: 15-410 Fall 2007 3 Protection Boundaries • Protection is “Job 1” – Protect processes from each other – Protect crucial services (like the kernel) from processes • Notes – Implied assumption: everyone trusts the kernel – Kernels are complicated ∗ See Project 3 :) ∗ Something to think about · Full OS is millions of lines of code · Very roughly: correctness ∝ 1/code size Carnegie Mellon University: 15-410 Fall 2007 4 Abstraction Layer • Present “simple”, “uniform” interface to hardware • Applications see a well defined interface (system calls) – Block Device (hard disk, flash card, network mount, USB drive) – CD drive (SCSI, IDE) – tty (teletype,
    [Show full text]
  • DEPARTMENT of LABOR Occupational Safety and Health Administration
    This document is scheduled to be published in the Federal Register on 03/11/2016 and available online at http://federalregister.gov/a/2016-05485, and on FDsys.gov DEPARTMENT OF LABOR Occupational Safety and Health Administration [Docket No. OSHA-2012-0035] Traylor Bros., Inc.; Grant of a Permanent Variance AGENCY: Occupational Safety and Health Administration (OSHA), Labor. ACTION: Notice. SUMMARY: In this notice, OSHA grants a permanent variance to Traylor Bros., Inc., from the provisions of OSHA standards that regulate work in compressed-air environments at 29 CFR 1926.803. DATES: The permanent variance specified by this notice becomes effective on [INSERT DATE OF PUBLICATION IN THE FEDERAL REGISTER] and shall remain in effect until it is modified or revoked. FOR FURTHER INFORMATION CONTACT: Information regarding this notice is available from the following sources: Press inquiries: Contact Mr. Frank Meilinger, Director, OSHA Office of Communications, U.S. Department of Labor, 200 Constitution Avenue, NW., Room N- 3647, Washington, DC 20210; telephone: (202) 693-1999; email: [email protected]. General and technical information: Contact Mr. Kevin Robinson, Director, Office of Technical Programs and Coordination Activities, Directorate of Technical Support and Emergency Management, Occupational Safety and Health Administration, U.S. Department of Labor, 200 Constitution Avenue, NW., Room N-3655, Washington, DC 20210; telephone: (202) 693-2110; email: [email protected]. OSHA’s web page 1 includes information about the Variance Program (see http://www.osha.gov/dts/otpca/variances/index.html). SUPPLEMENTARY INFORMATION: Copies of this Federal Register notice. Electronic copies of this Federal Register notice are available at http://www.regulations.gov.
    [Show full text]
  • Security Hardened Remote Terminal Units for SCADA Networks
    University of Louisville ThinkIR: The University of Louisville's Institutional Repository Electronic Theses and Dissertations 5-2008 Security hardened remote terminal units for SCADA networks. Jeff Hieb University of Louisville Follow this and additional works at: https://ir.library.louisville.edu/etd Recommended Citation Hieb, Jeff, "Security hardened remote terminal units for SCADA networks." (2008). Electronic Theses and Dissertations. Paper 615. https://doi.org/10.18297/etd/615 This Master's Thesis is brought to you for free and open access by ThinkIR: The University of Louisville's Institutional Repository. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of ThinkIR: The University of Louisville's Institutional Repository. This title appears here courtesy of the author, who has retained all other copyrights. For more information, please contact [email protected]. SECURITY HARDENED REMOTE TERMINAL UNITS FOR SCADA NETWORKS By Jeffrey Lloyd Hieb B.S., Furman University, 1992 B.A., Furman University, 1992 M.S., University of Louisville, 2004 A Dissertation Submitted to the Faculty of the Graduate School of the University of Louisville in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Department of Computer Science and Computer Engineering J. B. Speed School of Engineering University of Louisville Louisville, Kentucky May 2008 SECURITY HARDENED REMOTE TERMINAL UNITS FOR SCADA NETWORKS By Jeffrey Lloyd Hieb B.S., Furman University, 1992 B.A., Furman University, 1992 M.S., University of Louisville, 2004 A Dissertation Approved on February 26, 2008 By the following Dissertation Committee members Dr. James H. Graham, Dissertation Director Dr.
    [Show full text]
  • Operating Systems, 1997., the Sixth Work
    Experience with the Development of a Microkernel-Based, Multiserver Operating System Freeman L. Rawson I11 IBM Austin Abstract and feel” of any operating system in the set while maintaining a single system image that shared as much code as possible among the During the first half the 1990s IBM developed a set . of of personalities operating system products called Worhplace OS that was bused . that offered full compatibility with all of the operating on the Mach 3.0 microkernel and Taligent’s object-oriented systems in the set and with DOSlWindows 3.1 TalOS. These products were intended to be scalable, portable + which offered the choice of a fully object-oriented and capable of concurrently running multiple operating system operating system including both object-oriented interfaces personalities while sharing as much code as possible. The and an object-oriented implementation operating system personalities were constructed out of a set of - which provided real time operation. user-level personality and personality-neutral servers and Since the technologies were modular, the project was libraries. While we made a number of important changes to structured as a set of related products so that customers could Mach 3.0, we maintained its fundamentals and the multi-server buy precisely the parts that they needed. The project as a design throughout our project. In evaluating the resulting system, whole was known as Workplace OS (WPOS) but was often a number ofproblems are apparent. There is no good way to referred to as the “microkemel-based” system because of the factor multiple existing systems into a set of functional servers central role played by the microkernel and because the without making them excessively large and complex.
    [Show full text]
  • THREATS of CLOUD COMPUTING and ITS SECURITY-A SURVEY Deepak Painuli1, Divya Mishra2 1,2Quantum School of Technology, India
    THREATS OF CLOUD COMPUTING AND ITS SECURITY-A SURVEY Deepak Painuli1, Divya Mishra2 1,2Quantum School of Technology, India Abstract Keywords: Cloud Computing, Internet, Cloud computing means we can store and Security, Phishing, Measurement, Survey access the data over the internet rather than method. in the hard drive. So it is also known as I.INTRODUCTION internet computing. With the help of cloud Cloud computing is not a new technology but computing the services like servers, rather a new delivery model for information and applications are delivered to an services using existing technologies. It uses the organization’s computer through internet. So internet infrastructure to allow communication its growth increases severe security concerns. between client side and server side Security has been a constant matter for services/applications. Cloud service providers internet and Open Systems, when we are (CSP’s) offer cloud platforms for their customers dealing with security cloud suffers a lot. Lack to use and create their web services, much like of security is the only hurdle in wide adoption internet service providers offer costumers high of cloud computing. Many security issues like speed broadband to access the internet. CSPs and securing user data, user authentication or ISPs both offer services. Mostly a layer of authorization, application protection or abstraction is provided by cloud between the low portability and measuring the utilization of level architecture involved and the computing cloud by cloud provider affect cloud resources. Based on different-2 services, cloud computing to great extent. The wide poses different-2 architecture to be used. The acceptance www has raised security risks data is stored on to centralized location called along with the uncountable benefits, so is the data canters having a large size of data storage.
    [Show full text]