TITLE

Consider Outsourcing Destruction Needs

PUB. DATE
January 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2007, Vol. 44 Issue 1, p42
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the outsourcing firms that handle destruction of computer and communications equipment as well as sensitive objects in the U.S. The firm Security Engineered Machinery offers service specializing in the destruction of sensitive electronic records for business and government agencies throughout the country. All of the facility's equipment has been approved by the U.S. National Security Agency.
ACCESSION #
23691860

 

Related Articles

  • Nine Things You're Not Destroying But Should Be.  // Security: Solutions for Enterprise Security Leaders;Jan2007, Vol. 44 Issue 1, p40 

    The article discusses the issue regarding information theft. Disposal of sensitive information is of serious concern and emphasis on electronic records floating around instead of shredding papers is the least concern. It suggests proper disposal of information by one of three methods such as...

  • Moving Dispersion Method for Statistical Anomaly Detection in Intrusion Detection Systems. Golić, Jovan Dj. // ISeCure;Jul2009, Vol. 1 Issue 2, p71 

    A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure...

  • IT PLANNER 5 STEPS TO CONTINUOUS DATA PROTECTION. Preimesberger, Chris // eWeek;1/14/2008, Vol. 25 Issue 2, p39 

    The article provides five steps on how to install a continuous data protection (CDP) system. It mentions about the first step which is information technology (IT) managers need to plan CDP strategies around staff and in accordance with the policies of the company. After the stage of planning,...

  • IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY. Shreelekshmi, R.; Wilscy, M.; Veni Madhavan, C. E. // International Journal of Network Security & Its Applications;Oct2010, Vol. 2 Issue 4, p247 

    We propose a simple method for increasing the reliability of detection of LSB replacement steganography. RS Steganalysis Method (RSM), Sample Pair Method (SPM), and Least Square Method (LSM) are three of the most reliable steganalysis methods in the literature for LSB replacement steganography...

  • Security fears grow as iPods proliferate. Garretson, Cara // Network World;4/16/2007, Vol. 24 Issue 15, p1 

    The article reports on the issues concerning the recent security threats posed by iPod digital music players. According to the report, a company has suggested that iPods be banned from the workplace until proper protection is in place, as well as emergence of a proof-of-concept iPod virus. The...

  • Anomaly Intrusion Detection System Using Information Theory, K-NN and KMC Algorithms. Shirazi, Hossein M. // Australian Journal of Basic & Applied Sciences;2009, Vol. 3 Issue 3, p2581 

    The huge expansion in the size of internet and the appearance of various types of malicious attack and the in sufficiency of traditional security tools like antivirus conduct to the development of intrusion detection systems or IDS. Since current IDSs are signature based they still are unable to...

  • Anomaly Detection Using System Call Sequence Sets. Varghese, Surekha Mariam; Jacob, K. Poulose // Journal of Software (1796217X);Dec2007, Vol. 2 Issue 6, p14 

    This paper discusses our research in developing a generalized and systematic method for anomaly detection. The key ideas are to represent normal program behaviour using system call frequencies and to incorporate probabilistic techniques for classification to detect anomalies and intrusions....

  • Host-Based IDS.  // Network Dictionary;2007, p231 

    A reference entry for "host-based intrusion detection systems" (HIDS) is presented. HIDS use data from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon, then these operations are compared with a...

  • A Simple Algorithm for Defect Detection From a Few Radiographies. Fillatre, Lionel; Nikiforov, Igor; Retraint, Florent // Journal of Computers;Aug2007, Vol. 2 Issue 6, p26 

    The paper concerns the radiographic nondestructive testing of well-manufactured objects. The detection of anomalies is addressed from the statistical point of view as a binary hypothesis testing problem with nonlinear nuisance parameters. A new simple and numerically stable detection scheme is...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics