Physical and Logical Security Convergence: Powered By Enterprise Security ManagementGovernment and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today’s changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more.
|
From inside the book
Results 1-5 of 96
Page xi
... deployed within the framework of an enterprise policy.The goal is to accelerate security deployments to defend orga- nizations against both traditional business risk and new global threats. Mr. Dunkel is a frequent speaker at security ...
... deployed within the framework of an enterprise policy.The goal is to accelerate security deployments to defend orga- nizations against both traditional business risk and new global threats. Mr. Dunkel is a frequent speaker at security ...
Page xviii
... Deployment Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263 Standard ESM Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263 High-Availability and Geographically Dispersed ESM Deployments ...
... Deployment Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263 Standard ESM Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .263 High-Availability and Geographically Dispersed ESM Deployments ...
Page xxi
... Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .489 Log Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491 Challenges of Integration . . . . . . . . . . . . . . .
... Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .489 Log Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491 Challenges of Integration . . . . . . . . . . . . . . .
Page 6
... deployment of IP-based systems. It also enhances the development and deployment of new threats. One of the reasons we need to deploy defense in depth is to increase the number of barriers in place in order to shorten the window of ...
... deployment of IP-based systems. It also enhances the development and deployment of new threats. One of the reasons we need to deploy defense in depth is to increase the number of barriers in place in order to shorten the window of ...
Page 16
... deployment of information technologies and are changing the basic function of management.The process of directing and controlling the operations of a business or military orga- nization is embracing more collaboration across multiple ...
... deployment of information technologies and are changing the basic function of management.The process of directing and controlling the operations of a business or military orga- nization is embracing more collaboration across multiple ...
Contents
15 | |
59 | |
93 | |
Chapter 5 IT Governance and Enterprise Security Policy | 123 |
Chapter 6 The Evolution of Global Security Solutions | 151 |
Politics Industry and Business Value | 189 |
The Trusted Enterprise | 225 |
Chapter 9 ESM Architecture | 255 |
Chapter 12 Event Storage and Forensic Analysis | 351 |
Chapter 13 Bridging the Chinese Wall | 371 |
Chapter 14 Physical and Logical Access | 403 |
Chapter 15 Intelligent Video Analytics | 445 |
Chapter 16 Environmental Sensors | 481 |
Process Control and SCADA | 503 |
Chapter 18 Final Thoughts | 549 |
Index | 555 |
Chapter 10 Log Collection | 289 |
Chapter 11 RealTime Event Correlation Analysis and Response | 319 |
Other editions - View all
Common terms and phrases
ability access control alert analyst applications ArcSight assets attacks authentication cameras capabilities chapter Cisco Cisco Systems collaboration communications companies configuration connectors control systems corporate correlation cyber data center database defense deployed deployment devices e-mail electronic employees enterprise security ESM manager ESM system example executive field Figure firewall global identity management impact In-Q-Tel integration intelligence Internet intrusion detection system IP network issues leverage Linux log collection logical security logon malware Modbus monitoring multiple operating system organization organization’s password percent physical access physical and logical physical security process control protect Protocol real-time response RFID SCADA security convergence security industry security policy security solutions sensors server SMTP standard strategy supply chain syslog target TCP/IP threats tion trusted enterprise Unisys username vendors video analytics video surveillance VoIP vulnerabilities worldwide
Popular passages
Page 20 - If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.
Page 147 - This order is intended only to improve the internal management of the executive branch and is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or equity by a party against the United States, its agencies or instrumentalities, its officers or employees, or any other person.
Page 112 - There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time.
Page 108 - Critical infrastructure sectors (ie, agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemical industry and...
Page 52 - Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures...
Page 222 - Facts, data, and analysis support a variety of company purposes, such as planning, reviewing company performance, improving operations, and comparing company quality performance with competitors' or with "best practices
Page 43 - To recognize always that the extent to which the co-operation of the public can be secured diminishes, proportionately, the necessity of the use of physical force and compulsion for achieving police objectives.
Page 33 - All that remains for me to add is that you keep the whole matter as secret as possible. For upon Secrecy, success depends in most enterprises of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue.
Page 44 - To use physical force only when the exercise of persuasion, advice and warning is found to be insufficient to obtain public co-operation to an extent necessary to secure observance of law or to restore order, and to use only the minimum degree of physical force which is necessary on any particular occasion for achieving a police objective.
Page 197 - Order (EO) defined infrastructure as "the framework of interdependent networks and systems comprising identifiable industries, institutions (including people and procedures), and distribution capabilities that provide a reliable flow of products and services essential to the defense and economic security of the United States, the smooth functioning of government at all levels, and society as a whole.