Search and Find
Service
More of the content
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Front Cover
1
Physical and Logical Security Convergence
4
Copyright Page
5
Contents
16
Foreword
24
Chapter 1. Introduction
28
Security Concepts and the Impact of Convergence
31
Chapter 2. The Evolution of Physical Security
42
Introduction
43
The History of Physical Security
46
The Four Categories of Physical Security
47
Command and Control: Automating Security Responses
79
Conclusion
83
Chapter 3. Security Convergence: What Is It Anyway?
86
Introduction
87
Defining Security Convergence
87
Functional Convergence Drives Security Solutions
95
Security Convergence Is Changing the Security Culture
99
The Convergence Role in Accelerating Security Solutions Worldwide
104
Security Convergence Is Changing the Sales Channel
113
Summary
118
Chapter 4. The Challenges Surrounding Security Convergence
120
Introduction
121
Technology History: Uncontrolled Internet Growth
122
Internet Productivity
127
Administration, Process, and Procedures: Management in the Internet Age
130
Benefits of Using Risk Management in Planning IT Security Administration
132
Security and Intelligence: The Impact of a New Surveillance Community
142
The DNI and the Intelligence Reform Act of 2004
145
Conclusion
149
Chapter 5. IT Governance and Enterprise Security Policy
150
The Twenty-First-Century Business Model
151
What Is IT Governance?
154
IT Governance Research: MIT Sloan School of Management
157
The New Management Strategy Behind IT Governance
162
Security Policy: A Growing Priority for IT Governance
163
Web Collaboration: A Global Communications Requirement
168
Government Compliance
171
Conclusion
176
Chapter 6. The Evolution of Global Security Solutions
178
Introduction
179
Collaboration Convergence:The Transfer of Military Technology
179
Follow the Money: Funding Sources and New Convergence Strategies
182
Security Convergence: Rapidly Going Global
192
The Starting Point: IdentityManagement and Access Control
196
The Challenges of Convergence: Positioning to Embrace Change
206
The Emergence of the CIO and Its Impact on Security Convergence
210
Conclusion
214
Chapter 7. Positioning Security: Politics, Industry, and Business Value
216
Twenty-First-Century Risk: Physical and Electronic Security Collaboration
217
Homeland Security
220
Industry Associations: Anticipating Trends in the Global Security Market
229
Convergence: Creating New Security Business Value
236
The Collaboration of Security Responsibilities
237
Chapter 8. The New Security Model: The Trusted Enterprise
252
How Wall Street Funded the Global Economy:Twenty-First Century Security
253
Wall Street Still Needs a Yardstick:The Trusted Enterprise Valuation
256
Identity and Verification:The Foundation of the Trusted Enterprise
258
Unisys Corporation: Leading the Way to the Trusted Enterprise
260
Modeling the Trusted Enterprise
265
Conclusion
280
Chapter 9. ESM Architecture
282
Introduction
283
What Is ESM?
283
ESM at the Center of Physical and Logical Security Convergence
286
ESM Deployment Strategies
290
The Convergence of Network Operations and Security Operations
298
Conclusion
314
Chapter 10. Log Collection
316
Introduction
317
National Institute ofStandards and Technology (NIST) Special Publication 800-92
318
Log Normalization
319
Log Severity
327
Log Time Correction
329
Log Categorization
330
What to Transport
332
When to Transport
342
How to Transport
343
Conclusion
345
Chapter 11. Real-Time Event Correlation, Analysis, and Response
346
Introduction
347
Threat Formulas
347
Correlation and Rules
349
Active Channels
362
Dashboards
364
Workflow
370
Conclusion
376
Chapter 12. Event Storage and Forensic Analysis
378
Introduction
379
Event Storage
379
Discovering and Interacting with Patterns
387
Conclusion
397
Chapter 13. Bridging the Chinese Wall
398
Introduction
399
What Is a Chinese Wall?
399
Data Sources
402
Bridging the Chinese Wall: Detection through Convergence
419
Conclusion
428
Chapter 14. Physical and Logical Access
430
Introduction
431
Use-Case Exploration
431
Data Sources
433
Detection through Convergence: Physical + VPN Access
461
Detection through Convergence: Administrative Account Sharing
466
Conclusion
471
Chapter 15. Intelligent Video Analytics
472
Introduction
473
Technology Background: Video Analytics
473
Data Sources
479
Detection through Convergence
498
Conclusion
506
Chapter 16. Environmental Sensors
508
Introduction
509
Environmental Sensors: A Technology Background
509
Providing Automated Response to Environmental Threats
513
Challenges of Integration
522
Data Center Meltdown
524
Conclusion
529
Chapter 17. Protecting Critical Infrastructure: Process Control and SCADA
530
Introduction
531
Technology Background: Process Control Systems
532
Why Convergence?
546
Threats and Challenges
550
Conclusion
573
Chapter 18. Final Thoughts
576
Introduction
577
Final Thoughts from William Crowell
577
Final Thoughts from Dan Dunkel
578
Final Thoughts from Brian Contos
579
Final Thoughts from Colby DeRodeoff
580
Index
582
All prices incl. VAT