Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Physical and Logical Security Convergence: Powered By Enterprise Security Management -  Brian T Contos,  William P Crowell,  Colby DeRodeff,  Dan Dunkel

Physical and Logical Security Convergence: Powered By Enterprise Security Management (eBook)

eBook Download: PDF
2011 | 1. Auflage
592 Seiten
Elsevier Science (Verlag)
978-0-08-055878-3 (ISBN)
Systemvoraussetzungen
48,95 inkl. MwSt
(CHF 47,80)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.
This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today's changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more.
*This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats
*The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world
*Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide

William P. Crowell is an Independent Consultant specializing in Information Technology, Security and Intelligence Systems. He also is a director and Chairman of Broadware Technologies, an Internet streaming-video company, a director of ArcSight, Inc., an enterprise security management software company, a director of Narus, a software company specializing in IP telecommunications Infrastructure software, a director at Ounce Labs, a software company specializing in source code vulnerability assessment tools and a director of RVison, a video surveillance technology company. In July 2003 he was appointed to the Unisys Corporate Security Advisory Board (now the Security Leadership Institute) to address emerging security issues and best practices.
William P. Crowell served as President and Chief Executive Officer of Santa Clara, California-based Cylink Corporation, a leading provider of e-business security solutions from November 1998 to February 2003, when Cylink was acquired by SafeNet, Inc., a Baltimore based VPN technology and security products company. He continues to serve as a consultant and member of the Federal Advisory Board at SafeNet.
Crowell came to Cylink from the National Security Agency, where he held a series of senior positions in operations, strategic planning, research and development, and finance. In early 1994 he was appointed as the Deputy Director of NSA and served in that post until his retirement in late 1997 From 1989 to 1990, Crowell served as a vice president at Atlantic Aerospace Electronics Corporation, now a subsidiary of Titan Systems, leading business development in space technology, signal processing and intelligence systems.
In April 1999, Crowell was appointed to the President's Export Council (PEC), which advised the administration on trade and export policy. He served as chairman of the PEC Subcommittee on Encryption, which worked with the Administration, Congress and private industry to substantially loosen restric
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today's changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide

Front Cover 1
Physical and Logical Security Convergence 4
Copyright Page 5
Contents 16
Foreword 24
Chapter 1. Introduction 28
Security Concepts and the Impact of Convergence 31
Chapter 2. The Evolution of Physical Security 42
Introduction 43
The History of Physical Security 46
The Four Categories of Physical Security 47
Command and Control: Automating Security Responses 79
Conclusion 83
Chapter 3. Security Convergence: What Is It Anyway? 86
Introduction 87
Defining Security Convergence 87
Functional Convergence Drives Security Solutions 95
Security Convergence Is Changing the Security Culture 99
The Convergence Role in Accelerating Security Solutions Worldwide 104
Security Convergence Is Changing the Sales Channel 113
Summary 118
Chapter 4. The Challenges Surrounding Security Convergence 120
Introduction 121
Technology History: Uncontrolled Internet Growth 122
Internet Productivity 127
Administration, Process, and Procedures: Management in the Internet Age 130
Benefits of Using Risk Management in Planning IT Security Administration 132
Security and Intelligence: The Impact of a New Surveillance Community 142
The DNI and the Intelligence Reform Act of 2004 145
Conclusion 149
Chapter 5. IT Governance and Enterprise Security Policy 150
The Twenty-First-Century Business Model 151
What Is IT Governance? 154
IT Governance Research: MIT Sloan School of Management 157
The New Management Strategy Behind IT Governance 162
Security Policy: A Growing Priority for IT Governance 163
Web Collaboration: A Global Communications Requirement 168
Government Compliance 171
Conclusion 176
Chapter 6. The Evolution of Global Security Solutions 178
Introduction 179
Collaboration Convergence:The Transfer of Military Technology 179
Follow the Money: Funding Sources and New Convergence Strategies 182
Security Convergence: Rapidly Going Global 192
The Starting Point: IdentityManagement and Access Control 196
The Challenges of Convergence: Positioning to Embrace Change 206
The Emergence of the CIO and Its Impact on Security Convergence 210
Conclusion 214
Chapter 7. Positioning Security: Politics, Industry, and Business Value 216
Twenty-First-Century Risk: Physical and Electronic Security Collaboration 217
Homeland Security 220
Industry Associations: Anticipating Trends in the Global Security Market 229
Convergence: Creating New Security Business Value 236
The Collaboration of Security Responsibilities 237
Chapter 8. The New Security Model: The Trusted Enterprise 252
How Wall Street Funded the Global Economy:Twenty-First Century Security 253
Wall Street Still Needs a Yardstick:The Trusted Enterprise Valuation 256
Identity and Verification:The Foundation of the Trusted Enterprise 258
Unisys Corporation: Leading the Way to the Trusted Enterprise 260
Modeling the Trusted Enterprise 265
Conclusion 280
Chapter 9. ESM Architecture 282
Introduction 283
What Is ESM? 283
ESM at the Center of Physical and Logical Security Convergence 286
ESM Deployment Strategies 290
The Convergence of Network Operations and Security Operations 298
Conclusion 314
Chapter 10. Log Collection 316
Introduction 317
National Institute ofStandards and Technology (NIST) Special Publication 800-92 318
Log Normalization 319
Log Severity 327
Log Time Correction 329
Log Categorization 330
What to Transport 332
When to Transport 342
How to Transport 343
Conclusion 345
Chapter 11. Real-Time Event Correlation, Analysis, and Response 346
Introduction 347
Threat Formulas 347
Correlation and Rules 349
Active Channels 362
Dashboards 364
Workflow 370
Conclusion 376
Chapter 12. Event Storage and Forensic Analysis 378
Introduction 379
Event Storage 379
Discovering and Interacting with Patterns 387
Conclusion 397
Chapter 13. Bridging the Chinese Wall 398
Introduction 399
What Is a Chinese Wall? 399
Data Sources 402
Bridging the Chinese Wall: Detection through Convergence 419
Conclusion 428
Chapter 14. Physical and Logical Access 430
Introduction 431
Use-Case Exploration 431
Data Sources 433
Detection through Convergence: Physical + VPN Access 461
Detection through Convergence: Administrative Account Sharing 466
Conclusion 471
Chapter 15. Intelligent Video Analytics 472
Introduction 473
Technology Background: Video Analytics 473
Data Sources 479
Detection through Convergence 498
Conclusion 506
Chapter 16. Environmental Sensors 508
Introduction 509
Environmental Sensors: A Technology Background 509
Providing Automated Response to Environmental Threats 513
Challenges of Integration 522
Data Center Meltdown 524
Conclusion 529
Chapter 17. Protecting Critical Infrastructure: Process Control and SCADA 530
Introduction 531
Technology Background: Process Control Systems 532
Why Convergence? 546
Threats and Challenges 550
Conclusion 573
Chapter 18. Final Thoughts 576
Introduction 577
Final Thoughts from William Crowell 577
Final Thoughts from Dan Dunkel 578
Final Thoughts from Brian Contos 579
Final Thoughts from Colby DeRodeoff 580
Index 582

Erscheint lt. Verlag 18.4.2011
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Recht / Steuern Strafrecht Kriminologie
Sozialwissenschaften
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 0-08-055878-X / 008055878X
ISBN-13 978-0-08-055878-3 / 9780080558783
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 10,3 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95