Don't Duck the Ductwork

Eaves, Erik
June 2008
Security: Solutions for Enterprise Security Leaders;Jun2008, Vol. 45 Issue 6, p46
Trade Publication
The article offers information on the sensitive compartmented information facilities (SCIF), a storage room used to provide space for sensitive information in the U.S. The primary goal of this facility is to provide privacy and security to the information available within the space. For an SCIF facility, each duct that is greater than 96 square inches that passes through the SCIF area to an unrated space shall be protected with manbars. Also provided are the suggested designs of such facility.


Related Articles

  • Reverse Link High-Speed Packet Data Support in cdma2000 1xEV-DV: Upper Layer Protocols. Comstock, David; Vannithamby, Rath; Balasubramanian, Srinivasan; Liangchi A. Hsu; Mark W. Cheng // Communications Technology;Apr2005, Vol. 22 Issue 4, p48 

    This article describes the design enhancements of the upper layers of the cdma2000� Revision D standards [1] supporting high-speed wireless data on the 1xEV-DV reverse link. In Revision D, the reverse link peak data rate has been increased by an order of magnitude from 153.6 kb/s to 1.8...

  • SIGLa: an adaptable LIMS for multiple laboratories. Melo, Alexandre; Faria-Campos, Alessandra; DeLaat, Daiane Mariele; Keller, Rodrigo; Abreu, Vinícius; Campos, Sérgio // BMC Genomics;Jan2010 Supplement 5, Vol. 11, p1 

    Background: The need to manage large amounts of data is a clear demand for laboratories nowadays. The use of Laboratory Information Management Systems (LIMS) to achieve this is growing each day. A LIMS is a complex computational system used to manage laboratory data with emphasis in quality...

  • La figura emergente del Data Steward. Singh, Priya // Estrategia Financiera;jul/ago2014, Vol. 29 Issue 318, p60 

    No abstract available.

  • STANDARDY ŘÍZENÍ PODNIKOVÉ INFORMATIKY. Doucek, Petr; Novotný, Ota // E + M Ekonomie a Management / E+M Economics & Management;2007, Vol. 2007 Issue 3, p132 

    A boom of information and communication technology (ICT) causes an increasing dependence of all organizations on these technologies. ICT improvement in organizations of all types influences majority of their preformed processes. Essential importance of ICT could be also derived from general...

  • Syndromic surveillance for health information system failures: a feasibility study. Ong, Mei-Sing; Magrabi, Farah; Coiera, Enrico // Journal of the American Medical Informatics Association;May2013, Vol. 20 Issue 3, p506 

    Objective To explore the applicability of a syndromic surveillance method to the early detection of health information technology (HIT) system failures. Methods A syndromic surveillance system was developed to monitor a laboratory information system at a tertiary hospital. Four indices were...

  • Don't reinvent the wheel. Small, Mike // SC Magazine: For IT Security Professionals (UK Edition);Jun2004, Special section p6 

    This article outlines the benefits of following a recognized standard to achieve both security and compliance, in relation to computer security. Allegedly, record-keeping is becoming an ever more complex task in business. On the one hand, new regulations govern the way data is recorded and...

  • Software Sets the Course for New System Solutions. Freschi, Cynthia // Security: Solutions for Enterprise Security Leaders;Apr2009, Vol. 46 Issue 4, p52 

    The article discusses the trend of software-driven solutions for security systems in the U.S. It is noted that the introduction of H.264 megapixel Internet Protocol video surveillance cameras has influenced the utilization of software-based management solutions and how the video surveillance...

  • Data security: it's your problem too. Nicholson, Neil B. // New Hampshire Business Review;9/11/2009, Vol. 31 Issue 20, p31 

    The article offers information on how to prevent incidental disclosure of customers' personal information. The author suggests that the most effective way to protect personal information is to develop a written information security program for the business. It cites the significant role of the...

  • Security Information and Event Management. Carr, David F. // Baseline;Aug2005, Issue 47, p83 

    This article presents information on security information and event management (SIEM) systems. SIEM systems help you gather, store, correlate and analyze security log data from many different information systems. This data may prove valuable as part of a network security organization's...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics