"Going Virtual": Evolving PSIM to Fight Cyber Crime

Dunkel, Dan
April 2011
Security: Solutions for Enterprise Security Leaders;Apr2011, Vol. 48 Issue 4, p60
Trade Publication
The article focuses on the integration of the Physical Security Information Management (PSIM) concept to combat cyber crime activities. It says that the industry should follow the C4ISR systems (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) to fight cyber crime and to protect themselves. It adds that PSIM vendors should need to go on virtual storage and to monitor increasing cyber crime threats as part of their command and control responsibilities.


Related Articles

  • Evaluation method for IMS network attack effect based on fuzzy comprehensive evaluation. GUO Yan-zan; JI Xin-sheng; LIU Cai-xia; CHEN Zhi-nan // Application Research of Computers / Jisuanji Yingyong Yanjiu;Nov2013, Vol. 30 Issue 11, p3400 

    For the purpose of a quantitative understand for IMS network's attack effect, this paper introduced an evaluation method for IMS's attack effect based on fuzzy comprehensive evaluation. It constructed the attack index tree on the basis of analyzing the possible attack flow, and introduced...

  • A Secure Medical Information Management System for Wireless Body Area Networks. Xiyao Liu; Yuesheng Zhu; Yu Ge; Dajun Wu; Beiji Zou // KSII Transactions on Internet & Information Systems;Jan2016, Vol. 10 Issue 1, p221 

    The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the...

  • Hidden Losses of Computer Security.  // SDM: Security Distributing & Marketing;Nov2000, Vol. 30 Issue 14, p16 

    Focuses on studies dealing with business losses due to computer crime. Fastest growing sector of the security systems industry as of November 2000; Challenge of computer security; Organizations' recognition of the importance of investing in computer security protection.

  • Contemplating Cyber Risk. Burkett, Paul A. // Resources Magazine;Winter2010, p4 

    The article discusses the significance of implementing a comprehensive cyber risk management system for business enterprises that will enhance the company's software, application, data and information security. It relays that cyber risks management has developed into a process that requires the...

  • Invest in the right people & tools. Olney, Matthew // SC Magazine: For IT Security Professionals (15476693);Nov2010, Vol. 21 Issue 11, p50 

    The article emphasizes the importance of choosing the right people and tools to invest on with regard to cyber security. According to the author, companies should make it sure that their teams are competent and that the vendors are supporting their ability to develop customized and innovative...

  • Debate. Bentley, Alan; Sarwate, Amol // SC Magazine: For IT Security Professionals (UK Edition);May2006, p15 

    The article debates on whether companies should use unofficial patches to fix computer vulnerabilities. According to Alan Bentley, of PatchLink Corp., although rogue patches pose a significant threat to a network, a third-party fix that has been thoroughly tested, scrutinized, code reviewed and...

  • RETAILERS OFFERED COMPROMISE DETECTION SOLUTION.  // Computer Security Update;May2005, p3 

    This article reports that Intrusic in Waltham has introduced Zephon, the first and only Compromise Detection Solution that uncovers and helps remove malicious and unauthorized intruders on internal networks. Intrusic urges retail companies to thoroughly examine their network security...

  • Vulnerability assessment keeps airline flying. Chen, Anne // eWeek;6/28/2004, Vol. 21 Issue 26, p47 

    The article discusses computer security systems. When the w32.sasser.worm hit the Internet in May 2004, continental Airlines Inc.'s security team was able to find and plug its vulnerabilities before the worm could do any damage. As other enterprises rushed to contain the havoc caused by...

  • Yahoo Officials Confirm Hackers Nabbed 400,000 Passwords.  // CIO Insight;7/13/2012, p1 

    The article reports that an older file from the Yahoo Voices was nabbed by hackers which allowed them to access more than 400,000 user credentials as confirmed by officials of Yahoo! Inc. A Yahoo spokesperson states that the firm is fixing the vulnerability that led to data disclosure and is...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics