TITLE

Putting the "I" in PSIM

AUTHOR(S)
Zalud, Bill
PUB. DATE
October 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2009, Vol. 46 Issue 10, p28
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents advice from Steve Hunt concerning physical security information management (PSIM). He describes PSIM as a concept that transforms how end-users and integrators think about security while giving advice to concentrate on "I" in PSIM. It also mentions the benefits covered under PSIM such that it will improve response time to incidents and support existing systems while migrating to new systems.
ACCESSION #
44523590

 

Related Articles

  • Information Security -- the new challenges. Philpott, Don // Homeland Defense Journal;Nov2007, Vol. 5 Issue 11, p44 

    The article provides information concerning the new challenges in information security in the U.S. From a federal/civil view, the author infers that information security has a little bit of the intelligence community component and a whole lot of the law enforcement component. Another component...

  • Tip of the Week.  // Network World;5/30/2005, Vol. 22 Issue 21, p23 

    Focuses on the creation of light-weight identity system by Johannes Ernst.

  • At the coalface. Ahlberg, Magnus // Computer Bulletin;Nov2003, Vol. 45 Issue 6, p34 

    Growing use of PDAs is creating security risks for companies and opening up breaches of the Data Protection Act, says Magnus Ahlberg

  • Letters to the Editor. James, Tony; Anderson, Christine; Loy, Arthur; Ladkin, Peter; Duffy, Patrick; Ahmed, Kais; Watkins, Neal; Gosling, Andrew // Computer Bulletin;Nov2003, Vol. 45 Issue 6, p4 

    Several letters to the editor are presented in response to articles in previous issues including one on purposes of an information technology degree in the July and September 2009 issues, one on gap between companies' desires and university education in the July 2009 issue, and one on age...

  • Setting up a Secure Information System Using Information Security Management. Issa-Salwe, Abdisalam M. // International Journal of Research & Reviews in Computer Science;Jan2011, Vol. 2 Issue 1, p138 

    The security attention in information systems has grown in recent years according to their diffusion, the growing role they have in contexts in which they operate and their increasing complexity and exposure to possible attacks. This leads Information security not to be any longer a...

  • Getting to grips with data classification. Glynn, Sean // IM@T.Online;Dec2010/Jan2011, p3 

    The article discusses data classification and presents suggestions for implementing a data classification scheme in an organization. Data classification forms an important part of information lifecycle management and involves providing a level of sensitivity to data used by an organization. It...

  • Information Security: Recent Attacks on Federal Web Sites Underscore Need for Stronger Information Security Management: T-AIMD-99-223.  // GAO Reports;6/24/1999, p1 

    The Melissa computer virus temporarily disrupted the operations of some federal agencies earlier this year by forcing them to shut down their e-mail systems. Since then, the government and private industry have tangled with other viruses, some even more vexing than Melissa. This testimony...

  • DOES YOUR COMPANY PROTECT PERSONAL DATA? Johnson, Elizabeth // Business North Carolina;Jun2006, Vol. 26 Issue 6, p80 

    Discusses the factors to consider in conducting an audit of a company's data protection measures and addressing the issues arising in privacy and information-management law in the U.S. Provisions of privacy law for information-security breaches; Advantages of conducting a data audit to the...

  • How can we spread the security message?  // Computer Weekly;9/27/2005, p32 

    Presents views of several executives on business and information security issues in Great Britain. Argument of Brian Collins, head of Information Systems Department at Cranfield University, that raising awareness of business and information security issues should be treated as ongoing processes,...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics