TITLE

Don't Duck the Ductwork

AUTHOR(S)
Eaves, Erik
PUB. DATE
June 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2008, Vol. 45 Issue 6, p46
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the sensitive compartmented information facilities (SCIF), a storage room used to provide space for sensitive information in the U.S. The primary goal of this facility is to provide privacy and security to the information available within the space. For an SCIF facility, each duct that is greater than 96 square inches that passes through the SCIF area to an unrated space shall be protected with manbars. Also provided are the suggested designs of such facility.
ACCESSION #
33012932

 

Related Articles

  • Reverse Link High-Speed Packet Data Support in cdma2000 1xEV-DV: Upper Layer Protocols. Comstock, David; Vannithamby, Rath; Balasubramanian, Srinivasan; Liangchi A. Hsu; Mark W. Cheng // Communications Technology;Apr2005, Vol. 22 Issue 4, p48 

    This article describes the design enhancements of the upper layers of the cdma2000� Revision D standards [1] supporting high-speed wireless data on the 1xEV-DV reverse link. In Revision D, the reverse link peak data rate has been increased by an order of magnitude from 153.6 kb/s to 1.8...

  • SIGLa: an adaptable LIMS for multiple laboratories. Melo, Alexandre; Faria-Campos, Alessandra; DeLaat, Daiane Mariele; Keller, Rodrigo; Abreu, Vinícius; Campos, Sérgio // BMC Genomics;Jan2010 Supplement 5, Vol. 11, p1 

    Background: The need to manage large amounts of data is a clear demand for laboratories nowadays. The use of Laboratory Information Management Systems (LIMS) to achieve this is growing each day. A LIMS is a complex computational system used to manage laboratory data with emphasis in quality...

  • La figura emergente del Data Steward. Singh, Priya // Estrategia Financiera;jul/ago2014, Vol. 29 Issue 318, p60 

    No abstract available.

  • STANDARDY ŘÍZENÍ PODNIKOVÉ INFORMATIKY. Doucek, Petr; Novotný, Ota // E + M Ekonomie a Management / E+M Economics & Management;2007, Vol. 2007 Issue 3, p132 

    A boom of information and communication technology (ICT) causes an increasing dependence of all organizations on these technologies. ICT improvement in organizations of all types influences majority of their preformed processes. Essential importance of ICT could be also derived from general...

  • Syndromic surveillance for health information system failures: a feasibility study. Ong, Mei-Sing; Magrabi, Farah; Coiera, Enrico // Journal of the American Medical Informatics Association;May2013, Vol. 20 Issue 3, p506 

    Objective To explore the applicability of a syndromic surveillance method to the early detection of health information technology (HIT) system failures. Methods A syndromic surveillance system was developed to monitor a laboratory information system at a tertiary hospital. Four indices were...

  • Data security: it's your problem too. Nicholson, Neil B. // New Hampshire Business Review;9/11/2009, Vol. 31 Issue 20, p31 

    The article offers information on how to prevent incidental disclosure of customers' personal information. The author suggests that the most effective way to protect personal information is to develop a written information security program for the business. It cites the significant role of the...

  • Security Information and Event Management. Carr, David F. // Baseline;Aug2005, Issue 47, p83 

    This article presents information on security information and event management (SIEM) systems. SIEM systems help you gather, store, correlate and analyze security log data from many different information systems. This data may prove valuable as part of a network security organization's...

  • Electronic Access Control Systems: The Foundation of Your PSIM. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Jun2009, Vol. 46 Issue 6, p54 

    The article focuses on the use of electronic access control systems for physical security information management (PSIM). It highlights the consideration of the access control system in looking for the readiness in PSIM. It also indicates the things to be considered for the PSIM that include the...

  • Don't reinvent the wheel. Small, Mike // SC Magazine: For IT Security Professionals;Jun2004, Special section p6 

    This article outlines the benefits of following a recognized standard to achieve both security and compliance, in relation to computer security. Allegedly, record-keeping is becoming an ever more complex task in business. On the one hand, new regulations govern the way data is recorded and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics