Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Physical and Logical Security Convergence: Powered By Enterprise Security Management

Physical and Logical Security Convergence: Powered By Enterprise Security Management

of: William P Crowell, Brian T Contos, Colby DeRodeff, Dan Dunkel, Eric Cole

Elsevier Reference Monographs, 2011

ISBN: 9780080558783 , 592 Pages

Format: PDF

Copy protection: DRM

Windows PC,Mac OSX Apple iPad, Android Tablet PC's

Price: 48,95 EUR



More of the content

Physical and Logical Security Convergence: Powered By Enterprise Security Management


 

Front Cover

1

Physical and Logical Security Convergence

4

Copyright Page

5

Contents

16

Foreword

24

Chapter 1. Introduction

28

Security Concepts and the Impact of Convergence

31

Chapter 2. The Evolution of Physical Security

42

Introduction

43

The History of Physical Security

46

The Four Categories of Physical Security

47

Command and Control: Automating Security Responses

79

Conclusion

83

Chapter 3. Security Convergence: What Is It Anyway?

86

Introduction

87

Defining Security Convergence

87

Functional Convergence Drives Security Solutions

95

Security Convergence Is Changing the Security Culture

99

The Convergence Role in Accelerating Security Solutions Worldwide

104

Security Convergence Is Changing the Sales Channel

113

Summary

118

Chapter 4. The Challenges Surrounding Security Convergence

120

Introduction

121

Technology History: Uncontrolled Internet Growth

122

Internet Productivity

127

Administration, Process, and Procedures: Management in the Internet Age

130

Benefits of Using Risk Management in Planning IT Security Administration

132

Security and Intelligence: The Impact of a New Surveillance Community

142

The DNI and the Intelligence Reform Act of 2004

145

Conclusion

149

Chapter 5. IT Governance and Enterprise Security Policy

150

The Twenty-First-Century Business Model

151

What Is IT Governance?

154

IT Governance Research: MIT Sloan School of Management

157

The New Management Strategy Behind IT Governance

162

Security Policy: A Growing Priority for IT Governance

163

Web Collaboration: A Global Communications Requirement

168

Government Compliance

171

Conclusion

176

Chapter 6. The Evolution of Global Security Solutions

178

Introduction

179

Collaboration Convergence:The Transfer of Military Technology

179

Follow the Money: Funding Sources and New Convergence Strategies

182

Security Convergence: Rapidly Going Global

192

The Starting Point: IdentityManagement and Access Control

196

The Challenges of Convergence: Positioning to Embrace Change

206

The Emergence of the CIO and Its Impact on Security Convergence

210

Conclusion

214

Chapter 7. Positioning Security: Politics, Industry, and Business Value

216

Twenty-First-Century Risk: Physical and Electronic Security Collaboration

217

Homeland Security

220

Industry Associations: Anticipating Trends in the Global Security Market

229

Convergence: Creating New Security Business Value

236

The Collaboration of Security Responsibilities

237

Chapter 8. The New Security Model: The Trusted Enterprise

252

How Wall Street Funded the Global Economy:Twenty-First Century Security

253

Wall Street Still Needs a Yardstick:The Trusted Enterprise Valuation

256

Identity and Verification:The Foundation of the Trusted Enterprise

258

Unisys Corporation: Leading the Way to the Trusted Enterprise

260

Modeling the Trusted Enterprise

265

Conclusion

280

Chapter 9. ESM Architecture

282

Introduction

283

What Is ESM?

283

ESM at the Center of Physical and Logical Security Convergence

286

ESM Deployment Strategies

290

The Convergence of Network Operations and Security Operations

298

Conclusion

314

Chapter 10. Log Collection

316

Introduction

317

National Institute ofStandards and Technology (NIST) Special Publication 800-92

318

Log Normalization

319

Log Severity

327

Log Time Correction

329

Log Categorization

330

What to Transport

332

When to Transport

342

How to Transport

343

Conclusion

345

Chapter 11. Real-Time Event Correlation, Analysis, and Response

346

Introduction

347

Threat Formulas

347

Correlation and Rules

349

Active Channels

362

Dashboards

364

Workflow

370

Conclusion

376

Chapter 12. Event Storage and Forensic Analysis

378

Introduction

379

Event Storage

379

Discovering and Interacting with Patterns

387

Conclusion

397

Chapter 13. Bridging the Chinese Wall

398

Introduction

399

What Is a Chinese Wall?

399

Data Sources

402

Bridging the Chinese Wall: Detection through Convergence

419

Conclusion

428

Chapter 14. Physical and Logical Access

430

Introduction

431

Use-Case Exploration

431

Data Sources

433

Detection through Convergence: Physical + VPN Access

461

Detection through Convergence: Administrative Account Sharing

466

Conclusion

471

Chapter 15. Intelligent Video Analytics

472

Introduction

473

Technology Background: Video Analytics

473

Data Sources

479

Detection through Convergence

498

Conclusion

506

Chapter 16. Environmental Sensors

508

Introduction

509

Environmental Sensors: A Technology Background

509

Providing Automated Response to Environmental Threats

513

Challenges of Integration

522

Data Center Meltdown

524

Conclusion

529

Chapter 17. Protecting Critical Infrastructure: Process Control and SCADA

530

Introduction

531

Technology Background: Process Control Systems

532

Why Convergence?

546

Threats and Challenges

550

Conclusion

573

Chapter 18. Final Thoughts

576

Introduction

577

Final Thoughts from William Crowell

577

Final Thoughts from Dan Dunkel

578

Final Thoughts from Brian Contos

579

Final Thoughts from Colby DeRodeoff

580

Index

582