Physical and Logical Security Convergence: Powered By Enterprise Security Management

Physical and Logical Security Convergence: Powered By Enterprise Security Management

by William P Crowell, Colby DeRodeff, Dan Dunkel
     
 

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.

This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so

See more details below

Overview

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.

This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today’s changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more.

• This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats
• The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world
• Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide

Read More

Product Details

ISBN-13:
9781597491228
Publisher:
Elsevier Science
Publication date:
04/27/2007
Pages:
592
Product dimensions:
7.00(w) x 10.00(h) x 1.20(d)

Table of Contents

1. Introduction
2. Physical Security History
3. What is Convergence and Why Do We Care?
4. Examples from the Media, Interesting Stories
5. Identity Management and & Access Control
6. Video Surveillance & Video Analysis
7. Selling Security: R.O.I. & Enterprise Deployments
8. The New Security Organization: The Trusted Enterprise
9. ESM Architecture
10. ESM Log Collection
11. ESM Event Processing, Real-Time Analysis, and Response
12. ESM Event Storage and Forensic Analysis
13. Bridging the Chinese Wall
14. Physical Controls
15. Video Surveillance - Data Center Snapshots - Video Surveillance - Tailgating
16. Environmental Controls - Dell, NetBIOS
17. Oil and Gas: SCADA
18: Final Thoughts

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >