Completing the Vulnerability Survey

Khairallah, Michael
July 2007
Security: Solutions for Enterprise Security Leaders;Jul2007, Vol. 44 Issue 7, p70
Trade Publication
The article discusses the strategy to complete the security survey of the company by managing keys, understanding the consequences of potential loss and reviewing the collected data for the conclusion. The data that have been gathered on the security perimeters and the assessment should consider the effects of loss. The conclusion of the survey has to contain the documented result and the corresponding report based on the data to formulate a recommendation for the improvement of the security.


Related Articles

  • Breaking into home security. Harrington, Mike // CEE News;Jan2001, Vol. 53 Issue 1, p12 

    Reports the installation of residential security systems by electrical contractors in the United States. Marketing of security-alarm products to builders and homeowners; Integration of home security systems, power and data-wiring; Survey of residential security market from 1998 to 1999; Market...

  • Little Buildings for Big Security. Ritchey, Diane // Security: Solutions for Enterprise Security Leaders;Oct2009, Vol. 46 Issue 10, p34 

    The article offers ways in building prefab guardhouse that would ensure security. It suggests the use of self-locking doors as it is the human nature that people will prop them open. Additionally, it is important to secure the aircondition opening by incorporating a bracket, or something that...

  • CAM STYLE LOCK.  // SDM: Security Distributing & Marketing;Mar2001 Market Place, Vol. 31 Issue 4, p1 

    Features Videx's CyberLock cam style lock. Dimensions; Applications; Capabilities of the electronic cylinders.

  • Easy Re-Key Helps US West Maintain Security.  // Security: Solutions for Enterprise Security Leaders;Feb99, Vol. 36 Issue 2, p52 

    Features InstaKey system for key control and software tracking in the United States. Ability of the system to allow users to rekey own locks; Utilization of change key to break off wafer; Advantages and benefits of the system.

  • Grab Guard. MILLER, LYNN // American Road;Fall2011, Vol. 9 Issue 3, p75 

    The article offers information on the Grab Guard, a two-and-a-half-inch-wide circular lock.

  • Keys are different, somehow. MORRIS, DAN // Catholic East Texas;3/5/2010, Vol. 23 Issue 5, p4 

    The author comments on the significance of discarding old keys.

  • Keeping keys in the right hands. O'Connell, Tim // Security: Solutions for Enterprise Security Leaders;May98, Vol. 35 Issue 5, p65 

    Looks at devices that can secure, monitor and track keys. Includes electronic cabinets; Biometric interface from Morse Watchmans; Security key dispenser from Key Systems; TRACkey from Supra Products; Made-to-order key and custom-designed cabinets from Lund Equipment.

  • Untitled. Fone, Nick // Farmers Weekly;2/15/2013, Vol. 159 Issue 7, p51 

    The article evaluates the Zedlock lock.

  • 5 Five-Minute TECH QUIZ. Nelson, Ron // SDM: Security Distributing & Marketing;Jun2006, Vol. 36 Issue 6, p49 

    A quiz concerning the type of locks and its associated gadgets is presented.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics