Quantcast Security - 14238_12

Click Here to
Order this information in Print

Click Here to
Order this information on CD-ROM

Click Here to
Download this information in PDF Format


Click here to make tpub.com your Home Page

Page Title: Security
Back | Up | Next

Click here for a printable version




Information Categories
.... Administration
Food and Cooking
Nuclear Fundamentals
  Educational CD-ROM's
Printed Manuals
Downloadable Books



Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Chapter 1 Ship's Store Automation
Ships Serviceman 2 - How to fix and repair boats
Operating  the  ROM
SECURITY The  ROM  system  is  an  unclassified  system. There are two types of software security associated with  the  system:  physical  and  application. Physically,  the  ROM  system  terminal  must  be located in an area accessible only to personnel who have  a  need  to  use  the  system.  The  software security   is   based   on   the   concept   of   a   user’s authority to perform a given set of functions and makes   only   the   authorized   set   of   functions available.   Access   levels   are   determined   by password and user ID which will be assigned by the  ROM  system  administrator,  usually  the  ship’s store  officer.  The  ship’s  store  officer  will  input these access codes into the ROM system on a need- to-know basis. Password/security instructions are contained  in  appendix  F  of  the  ROM  Terminal User’s  Guide.  The  instructions  are  distributed to  the  ship’s  store  officer  only  during  the implementation  of  the  system.  All  persons  having access  to  the  ROM  system  will  be  listed  on  the ROM system security access rights list. This list is placed in an opaque envelope. It is then sealed and  tape  is  affixed  over  the  flap.  The  envelope containing  the  ROM  security  access  rights  list, along  with  the  password/security  instructions,  and appendix  F  of  the  TUG  will  be  retained  in  the ship’s store officer’s Accountability File (SSA-21). The  ship’s  store  officer  will  review  the  ROM security  access  rights  list  monthly.  If,  for  any reason, the user ID and password of the individual assigned sales officer are lost, the password file provided during implementation, which includes all users IDs and passwords, must be reloaded. Data files set up during implementation should therefore be maintained in a locked secure place such  as  the  ship’s  store  officer’s  accountability file. To reload the password file you should refer to  appendix  F  in  the  TUG. THE  ROM  SYSTEM The ROM system operates on a Zenith Z-248 and   the   Honeywell   PC   applications   processor (AP)    microcomputer.    Once   you   become   an authorized  user  of  the  ROM  system  you  will become  familiar  with  the  various  keys  on  the keyboard and their uses. The computer keyboard is similar to a typewriter keyboard with additional keys installed for special functions. Some of the different  types  of  keys  and  parts  of  the  ROM system are discussed below. Special  function  keys—The  special  function F keys include keys 1 through 10 and the Esc key. 1-2 The  F  keys  are  located  on  the  left  side  of  the computer while the ESC key is located on the right side  on  the  Honeywell  microcomputer.  On  the Zenith Z-248, both the F keys and the ESC key are located on the left side of the computer. The function you select will be taken from the ROM screen  display  that  lists  the  choices  available  with an F key or Esc key shown next to the description of  the  function  it  performs.  When  you  depress one  of  the  F  keys,  the  function  listed  on  the display screen is activated. Cursor   movement   keys—The   cursor   is   a special, blinking underscore character located on the screen that can be moved to where the user wants it. On the right side of the computer there are  four  directional  arrows  that  perform  different cursor   movements.   The   left   arrow   moves   the cursor  one  position  to  the  left  while  the  right arrow can move it one position to the right. The down arrow moves the cursor down while the up arrow   moves   the   cursor   up.   For   the   four directional arrows to perform cursor movement, the light on the num lock must be off. If the num lock  light  is  on,  the  four  directional  arrow  keys become   numeric   keys   and   cursor   movement cannot  be  performed. Display  screen—The  display  screen  on  the ROM is used to display and explain the informa- tion needed so a response by the user can be made. Information will appear on the screen as entered and   the   cursor   will   indicate   where   the   next character will be entered. Disk drives—These are storage devices used to  transfer  information  into  and  out  of  the computer’s  memory.  The  Zenith  Z-248  contains two   5   1/4-inch   floppy   disk   drives   and   two Winchester   disk   drives.   The   Honeywell   AP contains  two  5  1/4-inch  floppy  disk  drives  and one  Winchester  disk  drive. The disk storage of the computer is organized into  “files”  that  contain  one  or  more  “records.” Computer data records are like completed forms in  a  file  drawer.  Each  record  contains  several “fields.”  These  fields  are  equivalent  to  blocks  of information  on  forms  in  a  file  cabinet.  Just  as only one form type was filed in each folder, only one record type is stored in each data file. In the ROM  system,  for  example,  the  data  file  called ROMAS  (Resale  Operations  Stock  Record  Master file) contains information that is kept on the Stock Record, NAVSUP Form 464. There is one record in  the  ROMAS  data  file  for  each  merchandise item  carried  in  stock.  Each  record  contains  a

Privacy Statement - Press Release - Copyright Information. - Contact Us - Support Integrated Publishing

Integrated Publishing, Inc.
6230 Stone Rd, Unit Q Port Richey, FL 34668

Phone For Parts Inquiries: (727) 493-0744
Google +