Consider Outsourcing Destruction Needs

January 2007
Security: Solutions for Enterprise Security Leaders;Jan2007, Vol. 44 Issue 1, p42
Trade Publication
The article focuses on the outsourcing firms that handle destruction of computer and communications equipment as well as sensitive objects in the U.S. The firm Security Engineered Machinery offers service specializing in the destruction of sensitive electronic records for business and government agencies throughout the country. All of the facility's equipment has been approved by the U.S. National Security Agency.


Related Articles

  • Nine Things You're Not Destroying But Should Be.  // Security: Solutions for Enterprise Security Leaders;Jan2007, Vol. 44 Issue 1, p40 

    The article discusses the issue regarding information theft. Disposal of sensitive information is of serious concern and emphasis on electronic records floating around instead of shredding papers is the least concern. It suggests proper disposal of information by one of three methods such as...

  • Moving Dispersion Method for Statistical Anomaly Detection in Intrusion Detection Systems. Golić, Jovan Dj. // ISeCure;Jul2009, Vol. 1 Issue 2, p71 

    A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure...

  • IT PLANNER 5 STEPS TO CONTINUOUS DATA PROTECTION. Preimesberger, Chris // eWeek;1/14/2008, Vol. 25 Issue 2, p39 

    The article provides five steps on how to install a continuous data protection (CDP) system. It mentions about the first step which is information technology (IT) managers need to plan CDP strategies around staff and in accordance with the policies of the company. After the stage of planning,...

  • Security fears grow as iPods proliferate. Garretson, Cara // Network World;4/16/2007, Vol. 24 Issue 15, p1 

    The article reports on the issues concerning the recent security threats posed by iPod digital music players. According to the report, a company has suggested that iPods be banned from the workplace until proper protection is in place, as well as emergence of a proof-of-concept iPod virus. The...

  • Anomaly Intrusion Detection System Using Information Theory, K-NN and KMC Algorithms. Shirazi, Hossein M. // Australian Journal of Basic & Applied Sciences;2009, Vol. 3 Issue 3, p2581 

    The huge expansion in the size of internet and the appearance of various types of malicious attack and the in sufficiency of traditional security tools like antivirus conduct to the development of intrusion detection systems or IDS. Since current IDSs are signature based they still are unable to...

  • IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY. Shreelekshmi, R.; Wilscy, M.; Veni Madhavan, C. E. // International Journal of Network Security & Its Applications;Oct2010, Vol. 2 Issue 4, p247 

    We propose a simple method for increasing the reliability of detection of LSB replacement steganography. RS Steganalysis Method (RSM), Sample Pair Method (SPM), and Least Square Method (LSM) are three of the most reliable steganalysis methods in the literature for LSB replacement steganography...

  • Anomaly Detection Using System Call Sequence Sets. Varghese, Surekha Mariam; Jacob, K. Poulose // Journal of Software (1796217X);Dec2007, Vol. 2 Issue 6, p14 

    This paper discusses our research in developing a generalized and systematic method for anomaly detection. The key ideas are to represent normal program behaviour using system call frequencies and to incorporate probabilistic techniques for classification to detect anomalies and intrusions....

  • A Simple Algorithm for Defect Detection From a Few Radiographies. Fillatre, Lionel; Nikiforov, Igor; Retraint, Florent // Journal of Computers;Aug2007, Vol. 2 Issue 6, p26 

    The paper concerns the radiographic nondestructive testing of well-manufactured objects. The detection of anomalies is addressed from the statistical point of view as a binary hypothesis testing problem with nonlinear nuisance parameters. A new simple and numerically stable detection scheme is...

  • INTRUSION DETECTION FOR WEB APPLICATIONS. Dagorn, Nathalie // Proceedings of the IADIS International Conference on WWW/Interne;Jan2006, p452 

    Intrusion detection systems (IDS) are usually based on two techniques: misuse- and anomaly detection. Misuse detection relies on signatures; it is precise but can only accommodate already known attacks. Unlike this, anomaly detection models a system's usual behavior and is able to detect new...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics