TITLE

Security Convergence - The Future can be found in the Past

AUTHOR(S)
Elliott, David
PUB. DATE
March 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p68
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers the author's insights on physical security and information technology (IT) security. He says that the physical security and IT security cannot be combined due to the decentralization of computing resources and the Voice Over Internet Protocol (VoIP). He cites that the two will be complicated if merged unlike with the combination of telecommunications and IT. However, he adds that the two have the same goals in terms of protecting digital information of business enterprises.
ACCESSION #
50800592

 

Related Articles

  • Choice and Chance: A Conceptual Model of Paths to Information Security Compromise. Ransbotham, Sam; Mitra, Sabyasachi // Information Systems Research;Mar2009, Vol. 20 Issue 1, p121 

    No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from the perspective of the attacked...

  • AZ ELEKTRONIKUS INFORMÁCIÓVÉDELEM SZABÁLYOZÁSI KÉRDÉSEI A KÖZELMÚLTBAN. Károly, Kassai // Hadmérnök;mar2013, Vol. 8 Issue 1, p203 

    The accelerated development of communication services requires communication and information system (CIS) security regulations development as well. The flexible and updated security goals, security requirements, protection methods and mechanisms are key issues in order to develop and maintain...

  • how to stay connected. Hickman, Thomas // Strategic Finance;Sep2002, Vol. 84 Issue 3, p32 

    This article discusses the importance of comprehensive data protection in a company's disaster recovery plan. The author notes that with employees increasing using PCs and laptops to perform their work, their is also an increasing need for server backup to recover from information losses due to...

  • Information systems resources and information security. Chang, Kuo-chung; Wang, Chih-ping // Information Systems Frontiers;Sep2011, Vol. 13 Issue 4, p579 

    Recent studies suggest that the number of information security incidents has increased dramatically and has caused significant economic loss worldwide. Awareness of the significance of information security is evidenced by a rapid increase in information security investments. Despite the fact...

  • The management of information security --A South African case study. Fourie, L. C. H. // South African Journal of Business Management;Jun2003, Vol. 34 Issue 2, p19 

    The growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management, which leads to an ad hoc approach to...

  • NIKK GILBERT. Fisher, Dennis // Information Security;Jan2007, Vol. 10 Issue 1, p64 

    This article presents an interview with Nikk Gilbert, information technology (IT) security and telecommunications director at Alstom Transport. When asked about how challenging was the situation when he got to Alstom, Gilbert explains that there was no dedicated IT security person so he was not...

  • Untitled. Colley, John // Computer Weekly;4/27/2010, p8 

    In this article the author reflects on the prevalence of information security awareness for various organizations in Great Britain. He cites the maturity on the appreciation of information security among organizations such as the recruitment of security professionals, patch management, and...

  • An Evaluation of the Impact of ICT Technologies Practice on Internal Control Security System. Muchenje, Tonderai; Kariga, Progress // Annual International Conference on Infocomm Technologies in Comp;2014, p101 

    This paper presents an evaluation of emerging ICT technology solutions on the security internal control system on South African organizations. Information systems have enabled companies to communicate more efficiently, gain completive advantage and get a larger market share. These information...

  • 10 Top Security Trends That Will Impact You in 2016. Weldon, David // Information-management.com;12/23/2015, p2 

    The article discusses the expected top 10 global security trends in 2016 including an increase in attack types against the Internet of Things (IoT), the increased use of emerging countries with maturing infrastructures as attack surfaces, and the rise of industrial Internet Protocol (IP) theft.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics