Physical securityPhysical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.
Plant breedingPlant breeding is the science of changing the traits of plants in order to produce desired characteristics. It has been used to improve the quality of nutrition in products for humans and animals. The goals of plant breeding are to produce crop varieties that boast unique and superior traits for a variety of applications. The most frequently addressed agricultural traits are those related to biotic and abiotic stress tolerance, grain or biomass yield, end-use quality characteristics such as taste or the concentrations of specific biological molecules (proteins, sugars, lipids, vitamins, fibers) and ease of processing (harvesting, milling, baking, malting, blending, etc.
IT riskInformation technology risk, IT risk, IT-related risk, or cyber risk is any risk relating to information technology. While information has long been appreciated as a valuable and important asset, the rise of the knowledge economy and the Digital Revolution has led to organizations becoming increasingly dependent on information, information processing and especially IT. Various events or incidents that compromise IT in some way can therefore cause adverse impacts on the organization's business processes or mission, ranging from inconsequential to catastrophic in scale.
CyberwarfareCyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare. There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. One view is that the term is a misnomer since no cyber attacks to date could be described as a war.
Parasitic plantA parasitic plant is a plant that derives some or all of its nutritional requirements from another living plant. They make up about 1% of angiosperms and are found in almost every biome. All parasitic plants develop a specialized organ called the haustorium, which penetrates the host plant, connecting them to the host vasculature – either the xylem, phloem, or both. For example, plants like Striga or Rhinanthus connect only to the xylem, via xylem bridges (xylem-feeding).
Evolutionary history of plantsThe evolution of plants has resulted in a wide range of complexity, from the earliest algal mats, through multicellular marine and freshwater green algae, terrestrial bryophytes, lycopods and ferns, to the complex gymnosperms and angiosperms (flowering plants) of today. While many of the earliest groups continue to thrive, as exemplified by red and green algae in marine environments, more recently derived groups have displaced previously ecologically dominant ones; for example, the ascendance of flowering plants over gymnosperms in terrestrial environments.
Vascular plantVascular plants (), also called tracheophytes (trəˈkiː.əˌfaɪts) or collectively Tracheophyta (), form a large group of land plants (300,000 accepted known species) that have lignified tissues (the xylem) for conducting water and minerals throughout the plant. They also have a specialized non-lignified tissue (the phloem) to conduct products of photosynthesis. Vascular plants include the clubmosses, horsetails, ferns, gymnosperms (including conifers), and angiosperms (flowering plants).
Intrusion detection systemAn intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.
Convex optimizationConvex optimization is a subfield of mathematical optimization that studies the problem of minimizing convex functions over convex sets (or, equivalently, maximizing concave functions over convex sets). Many classes of convex optimization problems admit polynomial-time algorithms, whereas mathematical optimization is in general NP-hard.
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.