Physical and Logical Security Convergence: Powered By Enterprise Security Management
Syngress, Apr 18, 2011 - Computers - 592 pages
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.
This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today’s changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more.
*This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats
*The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world
*Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide
What people are saying - Write a review
We haven't found any reviews in the usual places.
What Is It Anyway?
Chapter 4 The Challenges Surrounding Security Convergence
Chapter 5 IT Governance and Enterprise Security Policy
Chapter 6 The Evolution of Global Security Solutions
Politics Industry and Business Value
The Trusted Enterprise
Chapter 9 ESM Architecture
Chapter 12 Event Storage and Forensic Analysis
Chapter 13 Bridging the Chinese Wall
Chapter 14 Physical and Logical Access
Chapter 15 Intelligent Video Analytics
Chapter 16 Environmental Sensors
Process Control and SCADA
Chapter 18 Final Thoughts
Chapter 10 Log Collection
Chapter 11 RealTime Event Correlation Analysis and Response
Other editions - View all
access control alert analyst applications ArcSight assets attack authentication beneﬁts cameras capabilities Cisco Systems collaboration communications companies conﬁguration connectors control systems corporate correlation critical database deﬁned deﬁnition deployed deployment devices difﬁcult e-mail efﬁciencies employees enterprise security ESM manager ESM system example executive ﬁeld Figure ﬁle ﬁnancial ﬁnd ﬁrewall ﬁrms ﬁrst ﬂow global identiﬁcation identity management impact In-Q-Tel infrastructure integration intelligence Internet intrusion detection system leverage Linux log collection logical security logon malware Modbus monitoring multiple ofﬁce ofﬁcers operating system organization password percent physical access physical and logical physical security process control protect Protocol real-time response RFID SCADA security convergence security industry security policy security solutions sensors server signiﬁcant speciﬁc standard strategy supply chain syslog target TCP/IP threats tion trafﬁc trusted enterprise Unisys vendors video analytics video surveillance VoIP
Page 20 - If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.
Page 33 - All that remains for me to add is that you keep the whole matter as secret as possible. For upon Secrecy, success depends in most enterprises of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue.