TITLE

Common Denominators and Uncommon Standards

PUB. DATE
December 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Dec2007, Vol. 44 Issue 12, p56
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article addresses lack of standardization of advanced surveillance cameras in security operations. Many problems will arise if standardization will not meet by the surveillance equipment vendors. First, the encryption mechanisms that have to be tailored between vendors. Next, the lack of quality of service mechanisms and support for distributed deployments. Finally, there is difficulties of changing the cameras' analytic programming.
ACCESSION #
27888415

 

Related Articles

  • Secure That Microcontroller. Wong, William // Electronic Design;11/15/2007, Vol. 55 Issue 26, p53 

    The article focuses on the encryption technology of security. It discusses the trend on the encryption of security in embedded applications at all levels including hardware. It also mentions some of the secure systems used in the industry including Secure Digital Music Initiative (SDMI) and the...

  • Protect Storage Solutions Against sophisticated Attacks. Rawlings, Craig // Electronic Design;8/14/2008, Vol. 56 Issue 16, p67 

    The article provides information on how to protect sensitive data against computer hackers in the U.S. The author stated that to ensure the survivability of key standards like HDMI, Blu-ray and WiMAX, technology-based security solutions that include physical-layer security are needed. In...

  • Chapter 7: Security. Carey, Peter // Internet & E-commerce;6/5/2001, p57 

    This chapter focuses on security management in electronic commerce. A discussion on electronic signatures and encryption is provided. It states that the Electronic Communications Act of 2000 provides that an electronic signature incorporated into or logically associated with a particular...

  • Keep your data networks breach-free with well-defined security policies. Perry, Michael // Las Vegas Business Press (10712186);8/24/2009, Vol. 26 Issue 34, pP22 

    The article discusses the use of security policies to keep data networks breach-free. The author states that business owners should develop a network architecture that minimizes opportunities for a security breach and their data-access policy should be contained within another security policies....

  • Do You Encrypt Your Backup Tapes?  // Storage Magazine;Aug2003, Vol. 2 Issue 6, p14 

    Highlights the practice of storage security companies in encrypting backup tapes. Encryption of backup tapes; Reasons for not encrypting backup tapes.

  • Putting a Mark on Content Security. Kuhl, Craig // Multichannel News;9/8/2008, Vol. 29 Issue 35, p22 

    The article discusses the value of digital-rights management and complementary technologies like watermarking in the implementing a tighter content security. The author reflects on the need for a more developed content security system in preventing possible hacks or piracy of theatrical films...

  • Destruction Protection. Semple, Erin // Government Security;Mar2006, Vol. 5 Issue 2, p28 

    The article focuses on the incorporation of new upgraded access control and security system at the Deseret Chemical Weapons and Chemical Munitions Stockpile in Tooele, Utah. The facility is controlled by the Army Chemical and Biological Command and is using the 1088++ Access Control and Security...

  • QUANTUM LEAP? Olenick, Doug // SC Magazine: For IT Security Professionals (15476693);Dec2015/Jan2016, Vol. 26 Issue 12, p16 

    The article discusses the economic impact of data encryption to the data protection of the security industry. It highlights the time consumption on the implementation of technology to ensure data protection against cyberthreat. It also cites the eventuality of quantum computing to data...

  • Prospective buyers want answers. Paller, Alan // Information Security;Apr2007, Vol. 10 Issue 4, p56 

    The article discusses the WhatWorks program by SANS Institute which aims to identify areas of concern for security managers in relation to prospective buyers of computer security products. The author states that the largest investments of users in the security product categories includes log...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics