全部版块 我的主页
论坛 新商科论坛 四区(原工商管理论坛) 商学院 运营管理(物流与供应链管理)
1977 4
2013-01-07
        Physical and Logical Security Convergence                       
Physical and Logical Security Convergence: Powered By Enterprise Security (首发)
Powered by enterprise security management               
                Copyright © 2007 Elsevier Inc. All rights reserved        
                                              
Author(s): Brian T. Contos, CISSP, William P. Crowell, Colby DeRodeff, GCIA, GCNA, Dan Dunkel, Dr. Eric Cole and Regis McKenna                                
ISBN: 978-1-59749-122-8

Edited by
  • Eric Cole, Independant network security consultant and speaker, USA
By
  • William Crowell, Former Deputy Director, National Security Agency
  • Brian Contos, CISSP, Chief Security Officer, ArcSight Inc.
  • Colby DeRodeff, GCIA, GCNA Manager, Technical Marketing, ArcSight, Inc., CA
  • Dan Dunkel, President, New Era Associates, LLC., Dallas/Ft. Worth, TX, USA
                                Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today’s changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more.

Audience
System and security administrators as well as operational managers for physical security and information technology departments in public and private organizations are the primary audiences for this book. Additionally, it is valuable for any individual or organization that needs the technical knowledge to converge the historically disparate professions of information technology and physical security. Finally, it is valuable to any group desiring greater operational efficiencies and a reduction in overall risk in regards to: hackers, terrorist, organized crime, nation-state threats, malicious insiders, malicious competitors, and other criminals.


Reviews               
                                                                                                                        Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cressey, NBC News terrorism analyst Written for both practitioners and managers, the authors provide the necessary background information as well as copious technical detail, and they round it out with a view of the converged security future. Numerous real-world examples and case studies are interwoven throughout the text, providing ample evidence that convergence is happening, but it is also hard to do well. Take advantage of the years in the government and commercial arenas that the authors have, their knowledge of current and emerging technologies, and their insight on other's successes and failures.- Dr. Jim Jones, CISSP, Senior Scientist, SAIC In my opinion the authors do an exceptional job explaining the need for more comprehensive approaches to achieving operational risk management within business and governmental organizations. The authors clearly demonstrate why convergence of physical and logical security is a natural evolution with significant advantages to all participants.- Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute The consistent and persistent message in this book is needed and well presented Corporate executives must understand and implement converged security or get left behind. This message is presented using a nice balance of historical examples and contemporary business issues and case studies. The authors make their points by presenting information from the public, and government perspectives. Thus, this book is appropriate for any leader in the field of security (physical or IT).- Dr. Terry Gudaitis, Cyber Intelligence Director, Cyveillance Physical & Logical Security Convergence: Enabling Rick Management in the Trusted Enterprises takes an in-depth look at how the issue of convergence is impacting enterprise security, particularly from the insider threat perspective. Solutions are commonly a reaction that lag behind evolving threat, be they technology or management focused. In the new world, we need bottom up approaches that converge solutions that keep up with evolution. This book is a primer for convergence in an evolving rish environment.- Dr. Bruce Gabrielson, NCE, Associate, Booz Allen Hamilton This book will be an invaluable guide to anyone involved in guiding security convergence or simply wanting to understand the power and benefits of convergence.-Mark Fernandes, Senior Manager, Deloitte

                        Contents               
                                       
  • 1. Introduction 2. Physical Security History 3. What is Convergence and Why Do We Care? 4. Examples from the Media, Interesting Stories 5. Identity Management and & Access Control 6. Video Surveillance & Video Analysis 7. Selling Security: R.O.I. & Enterprise Deployments 8. The New Security Organization: The Trusted Enterprise 9. ESM Architecture 10. ESM Log Collection 11. ESM Event Processing, Real-Time Analysis, and Response 12. ESM Event Storage and Forensic Analysis 13. Bridging the Chinese Wall 14. Physical Controls 15. Video Surveillance - Data Center Snapshots - Video Surveillance - Tailgating 16. Environmental Controls - Dell, NetBIOS 17. Oil and Gas: SCADA 18: Final Thoughts

本帖隐藏的内容








二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

全部回复
2013-1-7 14:50:35
哪弄的?
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2013-1-7 14:51:50
不错,谢谢分享
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2013-9-18 18:40:37
在后9/11世界的安全性远不止只是枪,警卫和大门。通过提供周到的和明智的建议,这将有助于任何读者了解网络世界的挑战,我们现在住进来 - 罗杰·克雷西, NBC新闻从业者和管理者都书面恐怖主义分析师,作者,作者做出了巨大的贡献,今天的安全辩论提供必要的背景信息,以及丰富的技术细节,并与他们周围的景色融合安全的未来。许多现实世界的例子和案例研究的整个文本交织在一起,提供充足的证据表明,收敛发生的,但它也很难做好。在ZF和商业领域,作者有多年的优势,当前和新兴技术的知识,他们了解对方的成功和失败 - 吉姆·琼斯博士, CISSP ,资深科学家,国家工商行政管理总局在我看来,做一个出色的工作,解释更全面的办法,以实现商业和ZF机构内的操作风险管理的需要。作者清楚地表明,为什么衔接的物理和逻辑安全是一个自然进化的显着优势,向所有参与者 - 据Ponemon研究所董事长兼创始人Larry Ponemon博士一贯和持久性消息是必要的,在这本书中提出了企业高管必须理解和实施安全融合或被甩在后面。此消息的历史实例和当代商业问题和案例研究,用一个很好的平衡。作者提出自己的观点,通过呈现信息从公众和ZF的观点。因此,这本书是适合任何安全(物理或IT )领域的领导者 - 网络情报总监特里博士Gudaitis , Cyveillance公司的物理和逻辑安全收敛:启用里克管理信得过企业需要深入了解如何衔接的问题,影响了企业的安全性,尤其是来自内部的威胁的角度来看。解决方案是常见的反应滞后不断变化的威胁,无论是技术或管理的重点。在新的世界里,我们需要自下而上的方法收敛跟上演进的解决方案。在一个不断变化的风险环境,这本书是一个收敛底漆 - 博士布鲁斯Gabrielson ,罗富国教育学院,副教授,博思艾伦咨询公司参与指导安全收敛,或只是想了解的权力和利益的人,这本书将是一个非常宝贵的指导。 convergence.德勤高级经理马克·费尔南德斯,
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2014-12-8 12:03:58
谢谢分享
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

相关推荐
栏目导航
热门文章
推荐文章

说点什么

分享

扫码加好友,拉您进群
各岗位、行业、专业交流群