TITLE

Convergence: Leap and the Net Will Appear

AUTHOR(S)
Zalud, Bill
PUB. DATE
April 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p28
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents the author's insight on using convergence in physical and information technology (IT) security. The author notes that convergence efforts are aim in protecting intellectual property, data and data centers. The author discusses the benefits of convergence such as reduce in cost of operation, more investments in technologies and open architecture. He cites several factors in attaining convergence which include network factor, infrastructure factor and cyber crime.
ACCESSION #
50801055

 

Related Articles

  • SCADA SECURITY IN THE CONTEXT OF CORPORATE NETWORK INTEGRATION. CIPRIAN, BOLDEA // Analele Universitatii Maritime Constanta;2011, Vol. 12 Issue 15, p159 

    The paper presents some considerations regarding security management of Supervisory Control and Data Acquisition (SCADA) networks. Control systems are potential targets of attack from hackers, cyber terrorists, others who want to disrupt the critical infrastructure, disgruntled or former...

  • Protecting from Identity Theft? A Good Start. Chronister, Dave // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p76 

    The article presents ideas about how organizations can better protect customer and employer databases from identity theft. It is important for security professionals to structure security solutions to identify threats, guard against automated scans and slow down and report possible intrusions....

  • Leave your passwords in your will.  // Computer Weekly;9/21/2010, p30 

    In this article the author offers his opinion on the need to create an impenetrable password to avoid increasing online fraud and identity theft.

  • Pentagon Needs To Get Better At Open Systems, Acquisition Chief Says. McCarthy, Mike // Defense Daily;9/22/2014, p1 

    The Department of Defense is not integrating modular capabilities into acquisition programs as effectively as it should and needs to do a better job ofÂ…

  • ESTABLISHING RUSSIA'S RESPONSIBILITY FOR CYBER-CRIME BASED ON ITS HACKER CULTURE. McDougal, Trevor // International Law & Management Review;Summer2015, Vol. 11, p55 

    The article focuses on the intellectual property rights and cyber-crime enforcement in Russia.

  • The dangers of APTs to business and how to mitigate threats to data. Ashford, Warwick // Computer Weekly;9/11/2012, p10 

    The article discusses the treat of cybercrime advanced persistent threats (APTs) to businesses and organizations, noting that corporate data such as intellectual property can be targeted for industrial espionage. Strategies for managing an ATP cyber attack are explored, such as holding security...

  • INFORMATION SECURITY: HOW TECHNOLOGY IS CHANGING THE FACE OF INFORMATION SECURITY.  // Law Update;5/20/2015, p1 

    This article provides an overview of laws which impact the information security in United Arab Emirates (UAE). Topics discussed include the Federal Law Number Five of 2012 termed as Cyber Crimes Law to handle hacking and data theft, the Dubai International Financial Centre's Data Protection Law...

  • Pentagon Examines Award Fees To Promote OA Systems. McCarthy, Mike // Defense Daily;1/25/2012, Vol. 253 Issue 16, p6 

    The article offers information on the DoD Open Systems Architecture Contract Guidebook, released by the U.S. Department of Defense, which calls for the development of open architecture (OA) systems. It is mentioned that the Pentagon emphasized on the more use of open architecture in systems to...

  • Navy Begins Round Of Online War Gaming On IP Rights. McCarthy, Mike // Defense Daily;7/17/2014, p9 

    The article reports that the U.S. Navy started the second round of online war gaming for addressing the contentious issue of intellectual property (IP) rights as part of the U.S. Department of Defense's effort of promoting open architecture systems and greater competition in acquisition...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics