TITLE

Real Training for Real Life

AUTHOR(S)
Stroberger, Michael
PUB. DATE
January 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2007, Vol. 44 Issue 1, p52
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses training as the most fundamental fact in the electronic security industry. It explains that training specifics are mandated by law and in some cases, common sense prevails. However, some basic theories must be taken into account, if the process is to be effective, efficient and thorough. There should be proper identification of mandated aspect of the training program based on the prevailing law and familiarity with the industry standards should be pursued vigorously.
ACCESSION #
23691864

 

Related Articles

  • Prevent, Detect and Respond: Intrusion Detection Systems. Pabrai, Uday O. Ali // Certification Magazine;Mar2003, Vol. 5 Issue 3, p27 

    Focuses on the features and functions of intrusion detection systems (IDS) designed to prevent attacks on an enterprise infrastructure. Types of attacks commonly reported by an IDS; Ways in which the attacks can be launched; Kinds of information that the attacks can provide to the attacker.

  • WHAT CUSTOMERS WANT. Maddry, Terry // SDM: Security Distributing & Marketing;Mar2004, Vol. 34 Issue 3, p61 

    Shares insights on customer's preferences for access control systems. Attribution of changing access needs of the organization and problems with a current system as the two most important reasons why a buyer purchases a different electronic access control system; Factors affecting the...

  • Revising the rules. Garcia, Andrew // eWeek;7/7/2008, Vol. 25 Issue 21, p51 

    The author reflects on the changes to Payment Card Industry (PCI) Security Standard in the U.S. He expects further enhancement to the wireless recommendations that will serve to adequately protect data and networks. He asserts that the new draft will not go so far as to require the use of...

  • Do we really need a security industry? McNamara, Paul // Network World;5/7/2007, Vol. 24 Issue 18, p46 

    The author comments on the views of a security expert/expert/provocateur Bruce Schneier on the need for security industry. Schneier is said to disagree about such requirement due to a belief that if computers are free from virus threats, security products are no longer needed. He agrees with...

  • Why the security firms need to love dogfood.  // SC Magazine: For IT Security Professionals (UK Edition);Jul2005, p47 

    This article focuses on security products available in the U.S. in July 2005. Researchers are finding flaws in security products faster than in anything else, even Windows. Yankee Group suggested a couple of possible reasons, such as the easy-to-find flaws in OSs have been exhausted, or perhaps...

  • Briefs.  // SC Magazine: For IT Security Professionals (15476693);Sep2013, Vol. 24 Issue 9, p14 

    This section offers news briefs concerning information security companies in the U.S. as of September 2013 including the partnership between zero-day protection solutions provider FireEye and PhishMe to boost their ability to detect threats against corporate environments, AVG Technologies'...

  • Security Uses for Wireless Networks. Engebretson, David // SDM: Security Distributing & Marketing;Jan2005, Vol. 35 Issue 1, p66 

    The article reports on several electronic security systems. Many of today's electronic security systems are designed to operate on a communications or computer network. The common wireless network systems in use today fall under the general description of Wi-Fi, which stands for wireless...

  • The New Perimeter of Security. Kelly, Michael J. // SDM: Security Distributing & Marketing;Dec2007, Vol. 37 Issue 12, p114 

    The author discusses the concern over the security of data over the Internet. According to the author, the electronic data security will become more important to the industry as the alarm industry moves deeper into the use of Internet-based technologies. He noted that the two-way video over the...

  • Integrated approach includes information security. Wood, Charles Cresson // Security: Solutions for Enterprise Security Leaders;Feb2000, Vol. 37 Issue 2, p43 

    Discusses the importance of a written information security policy in every organization especially with growth of the Internet and electronic commerce. Sample topics that should be included when creating an information security policy document; Purposes served by an information security policy....

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics