TITLE

Can You Outshine an Outsource?

AUTHOR(S)
Hunt, Steve
PUB. DATE
July 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p30
SOURCE TYPE
Trade Publication
DOC. TYPE
Editorial
ABSTRACT
The author offers his insights on whether outsourcing access control and video would be beneficial for companies in the physical security industry in the U.S. He shares his opinion whether it would be beneficial for companies to refuse outsourcing their security systems. Moreover, he suggests several computer software and related security systems that would protect companies from security theft and related crimes.
ACCESSION #
33303720

 

Related Articles

  • Improving the Performance of Medium Access Control (MAC) Layer Using Virtual Sensing Algorithm (VSA). Chand, C.P.Reshma; Linsely, J. Arul // International Journal of Research & Reviews in Computer Science;Mar2011, Vol. 2 Issue 2, p344 

    Nowadays, there is a wide range of communication over wireless networks. As the need for communication increases, there is a need to prevent wireless communication from collision. This paper presents a scheme, called the Virtual Sensing Algorithm (VSA) for efficient medium-access control (MAC)...

  • A Collaborative Fuzzy System for Unit Cost Forecasting with Partial Data Access. Toly Chen; Yu Cheng Wang // International Review on Computers & Software;Sep2011, Vol. 6 Issue 5, p700 

    Due to security considerations, the integral access to the unit cost data is often limited. As a result, it becomes extremely difficult to accurately predict the unit cost. To solve this problem, a collaborative fuzzy system is constructed in this study. The collaborative fuzzy system is...

  • A New Advanced User Authentication and Confidentiality Security Service. Majumder, Sanjay; Chakraborty, Sanjay; Das, Suman // International Journal of Computer Applications;May2014, Vol. 93, p4 

    Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service...

  • A Fast and Secure Scheme for Data Outsourcing in the Cloud. Yanjun Liu; Hsiao-Ling Wu; Chin-Chen Chang // KSII Transactions on Internet & Information Systems;Aug2014, Vol. 8 Issue 8, p2708 

    Data outsourcing in the cloud (DOC) is a promising solution for data management at the present time, but it could result in the disclosure of outsourced data to unauthorized users. Therefore, protecting the confidentiality of such data has become a very challenging issue. The conventional way to...

  • Research on Security Data Transmission Technology of Mobile sensor Network. CUI Yeqin; GAO Jianguo // Journal of Convergence Information Technology;May2013, Vol. 8 Issue 9, p30 

    The data transmission security is critical in mobile sensor network security. No reliable verification and validation means is available in the network, so the network is low-reliability. The communication signals are exposed to the physical space. The network data can be easily intercepted, so...

  • FTP: The Overlooked Achilles Heel. Johnson, Arne // Security: Solutions for Enterprise Security Leaders;Mar2008, Vol. 45 Issue 3, p108 

    The article discusses the risk in transporting or storing electronic data via File Transfer Protocol (FTP). FTP is described like a car without seatbelts, offering nothing beyond the basic transportation of the data. It demonstrates that it could be taken for granted and become subject to...

  • The secure GC: Data breach preparedness through auditing. Northrop, Seth A. // Inside Counsel (SyndiGate Media Inc.);1/5/2016, p1 

    The article presents information on an organization's data breach. Topics discussed include data breach response plan, security-related service responsibilities, and data security. Also being discussed are data communication, breach notification obligation, and data encryption provisions for an...

  • A Framework to Improve Virtual Private Network Architecture for Secure Data Transmission Using CMT-PA and Multi-Homing. Sreedevi, M.; Seshadri, R. // International Review on Computers & Software;Jul2012, Vol. 7 Issue 4, p1419 

    Secure communication over a network which is insecure, Virtual Private Network (VPN) plays an important role for providing security. Ensuring security in VPN is a major task since it is subject to several attacks along with the security criteria such as authentication, access control,...

  • A Bilateral Secure Threshold Signature Scheme with Distinguished Signing Authorities. Gu Lize; Wang Feng; Zhou Yousheng; Zheng Shi-hui // International Journal of Advancements in Computing Technology;May2012, Vol. 4 Issue 8, p100 

    Forward secure threshold signature plays an important role in distributed signature. In order to enhance the security and efficient of the forward secure threshold signature, a new forward secure threshold signature is proposed. The proposed scheme achieves not only the forward security but also...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics