TITLE

Security Convergence - The Future can be found in the Past

AUTHOR(S)
Elliott, David
PUB. DATE
March 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p68
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers the author's insights on physical security and information technology (IT) security. He says that the physical security and IT security cannot be combined due to the decentralization of computing resources and the Voice Over Internet Protocol (VoIP). He cites that the two will be complicated if merged unlike with the combination of telecommunications and IT. However, he adds that the two have the same goals in terms of protecting digital information of business enterprises.
ACCESSION #
50800592

 

Related Articles

  • Choice and Chance: A Conceptual Model of Paths to Information Security Compromise. Ransbotham, Sam; Mitra, Sabyasachi // Information Systems Research;Mar2009, Vol. 20 Issue 1, p121 

    No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from the perspective of the attacked...

  • Your 7 biggest IT security questions - answered. Baker, Hannah; Dunnett, Richard; Maxwell, Chris; Hassan, Behiye // Director;May2013, Vol. 66 Issue 8, p59 

    The article offers answers to several business information technology (IT) security questions, including how to manage security of employee laptops and mobile devices, what are the risks of cloud computing data storage, and how to create an electronic commerce (e-commerce) web site.

  • WHY information security is everybody's business. Jackson, Donovan // New Zealand Management;Dec2014/Jan2015, Vol. 61 Issue 5, p18 

    The article discusses reasons behind the need for everybody to be involved in information security. Topics discussed include the complexity of information technology (IT) in the 21st century, as well as the evolving nature of cyber risks, the role to be played by the chief executive officer on...

  • Be paranoid. Bentley, Tim // Georgia Trend;Aug99, Vol. 14 Issue 12, p52 

    Stresses the need for business enterprises in Georgia to be vigilant in protecting the security of their computer networks. Impact of the proliferation of information and its high speed transmission on the security of trade secrets; Threat of information pilferage and the vulnerability of...

  • AZ ELEKTRONIKUS INFORMÁCIÓVÉDELEM SZABÁLYOZÁSI KÉRDÉSEI A KÖZELMÚLTBAN. Károly, Kassai // Hadmérnök;mar2013, Vol. 8 Issue 1, p203 

    The accelerated development of communication services requires communication and information system (CIS) security regulations development as well. The flexible and updated security goals, security requirements, protection methods and mechanisms are key issues in order to develop and maintain...

  • VIRTUALIZATION.  // SC Magazine: For IT Security Professionals (15476693);Dec2011, Vol. 22 Issue 12, p54 

    The article focuses on the concept of virtualization. It mentions that virtualization has been able to change and address cloud computing tasks of companies which are looking for solutions to business operations. It cites that although cloud computing is considered a community resource, sharing...

  • Information security means better business. Brown, Richard // Computer Weekly;10/31/2006, p16 

    The article presents the author's views on an organization's information security management. According to him a company's information security must be effectively integrated and aligned with the corporate strategy, objectives, business structure and style. He asserts that recognizing security...

  • STRATEGIZING FOR BETTER TIMES. SAVAGE, MARCIA // Information Security;Apr2010, Vol. 12 Issue 3, p34 

    The article reflects on the status of security professionals after the recession. It states that security building will focus on efficiency, compliance requirements satisfaction, and security initiatives based on operational risks. It cites several measures taken by companies to survive the...

  • 10 IT security mistakes consistently made by businesses. NICHOLS, MIKE // Grand Rapids Business Journal;5/28/2013, Vol. 31 Issue 21, p11 

    The article offers information on ten information technology (IT) security mistakes consistently made by businesses. It mentions several mistakes including weak passwords that are not long and do not combine letters and numbers, keeping scanned documents on multi-function devices like printers,...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics